Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

91 Results Found
81 - 90 of 91 results
Episode 11: Remote Attestation Helps Zero Trust
Published on 07.16.2021
Episode 11: Remote Attestation Helps Zero Trust
Remote Attestation Helps Zero Trust Zero trust is an important information security architectural shift. Cyber breaches have increased in intensi...

Episode 10: Hospitals in Need of Cybersecurity STAT!
Published on 06.25.2021
Episode 10: Hospitals in Need of Cybersecurity STAT!
Hospitals in Need of Cybersecurity STAT! The medical industry is an appealing target for cyber-attackers due to the vast personal information hos...

Episode 9: Mitigating Risk: Information Security Governance
Published on 06.11.2021
Episode 9: Mitigating Risk: Information Security Governance
Mitigating Risk: Information Security Governance Information security governance ensures that an organization has the correct information structu...

Episode 8: CIS Controls v8…First Impressions
Published on 05.28.2021
Episode 8: CIS Controls v8…First Impressions
CIS Controls v8…First Impressions Part 2 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, host an...

Episode 7: CIS Controls v8…It’s Not About the List
Published on 05.14.2021
Episode 7: CIS Controls v8…It’s Not About the List
CIS Controls v8…It’s Not About the List Part 1 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, h...

Episode 6: 2020 Elections Year in Review
Published on 04.23.2021
Episode 6: 2020 Elections Year in Review
2020 Elections Year in Review In this edition of Cybersecurity Where You Are, host and CISO at the Center for Internet Security (CIS), Sean Atkin...

Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive Process
Published on 04.09.2021
Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive Process
The Tools of Cyber Defense…an Ongoing, Repetitive Process Part 2 of a 2-part series In this week’s Cybersecurity Where You Are podcast, hosts Ton...

Episode 4: Dynamics of Cyber Defense…an Ongoing, Repetitive Process
Published on 03.26.2021
Episode 4: Dynamics of Cyber Defense…an Ongoing, Repetitive Process
Dynamics of Cyber Defense…an Ongoing, Repetitive Process Part 1 of a 2-part series Technology is ever-changing AND ever-evolving, creating an unc...

Episode 3: Third-party Risk Management – Beyond the Questionnaire
Published on 03.12.2021
Episode 3: Third-party Risk Management – Beyond the Questionnaire
Third-party Risk Management – Beyond the Questionnaire   Can a third-party risk management assessment questionnaire be the catalyst for true chan...

Episode 2: Trends: Then, Now, and Into the Future
Published on 03.05.2021
Episode 2: Trends: Then, Now, and Into the Future
Trends: Then, Now, and Into the Future Sean Atkinson and Tony Sager discuss the top cybersecurity issues from 2020 and what the road ahead holds ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions