Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
Filter by Topic
91 Results Found
81 - 90 of 91 results
Published on 07.16.2021
Episode 11: Remote Attestation Helps Zero TrustRemote Attestation Helps Zero Trust Zero trust is an important information security architectural shift. Cyber breaches have increased in intensi...
Published on 06.25.2021
Episode 10: Hospitals in Need of Cybersecurity STAT!Hospitals in Need of Cybersecurity STAT! The medical industry is an appealing target for cyber-attackers due to the vast personal information hos...
Published on 06.11.2021
Episode 9: Mitigating Risk: Information Security GovernanceMitigating Risk: Information Security Governance Information security governance ensures that an organization has the correct information structu...
Published on 05.28.2021
Episode 8: CIS Controls v8…First ImpressionsCIS Controls v8…First Impressions Part 2 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, host an...
Published on 05.14.2021
Episode 7: CIS Controls v8…It’s Not About the ListCIS Controls v8…It’s Not About the List Part 1 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, h...
Published on 04.23.2021
Episode 6: 2020 Elections Year in Review2020 Elections Year in Review In this edition of Cybersecurity Where You Are, host and CISO at the Center for Internet Security (CIS), Sean Atkin...
Published on 04.09.2021
Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive ProcessThe Tools of Cyber Defense…an Ongoing, Repetitive Process Part 2 of a 2-part series In this week’s Cybersecurity Where You Are podcast, hosts Ton...
Published on 03.26.2021
Episode 4: Dynamics of Cyber Defense…an Ongoing, Repetitive ProcessDynamics of Cyber Defense…an Ongoing, Repetitive Process Part 1 of a 2-part series Technology is ever-changing AND ever-evolving, creating an unc...
Published on 03.12.2021
Episode 3: Third-party Risk Management – Beyond the QuestionnaireThird-party Risk Management – Beyond the Questionnaire Can a third-party risk management assessment questionnaire be the catalyst for true chan...
Published on 03.05.2021
Episode 2: Trends: Then, Now, and Into the FutureTrends: Then, Now, and Into the Future Sean Atkinson and Tony Sager discuss the top cybersecurity issues from 2020 and what the road ahead holds ...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More