Cybersecurity Where You Are (audio)
Center for Internet Security
Welcome to audio version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the video version of our podcast here: https://fast.wistia.net/embed/channel/0l9fss300m?wchannelid=0l9fss300m.
Categorias: Tecnología
Añadir a Mi Lista
Escuchar el último episodio:
Episodios anteriores
-
182 - Episode 182: Striking a Balance on an AI Adoption Journey Wed, 08 Apr 2026 - 0h
-
181 - Episode 181: Supply and Demand of Cybersecurity Ecosystems Wed, 01 Apr 2026 - 0h
-
180 - Episode 180: Secure by Design Fused to Operational Practices Wed, 25 Mar 2026 - 0h
-
179 - Episode 179: 2026 Cybersecurity Predictions from CIS — Pt 3 Wed, 18 Mar 2026 - 0h
-
178 - Episode 178: Appropriate Defense to Iranian Threat Activity Wed, 11 Mar 2026 - 0h
-
177 - Episode 177: Power of Community-Developed Security Content Wed, 04 Mar 2026 - 0h
-
176 - Episode 176: A Cybersecurity Journey of Incremental Wins Wed, 25 Feb 2026 - 0h
-
175 - Episode 175: Practically Solving Cyber Problems at Scale Wed, 18 Feb 2026 - 0h
-
174 - Episode 174: 2026 Cybersecurity Predictions from CIS — Pt 2 Wed, 11 Feb 2026 - 0h
-
173 - Episode 173: Scammer Jousting as Human Risk Management Wed, 04 Feb 2026 - 0h
-
172 - Episode 172: Helping CISOs as a CIS Controls Ambassador Wed, 28 Jan 2026 - 0h
-
171 - Episode 171: Securing CNI in U.S. SLTTs through AI Adoption Wed, 21 Jan 2026 - 0h
-
170 - Episode 170: Visibility for SLTTs in Blocking Typhoon APTs Wed, 14 Jan 2026 - 0h
-
169 - Episode 169: 2026 Cybersecurity Predictions from CIS — Pt 1 Wed, 07 Jan 2026 - 0h
-
168 - Episode 168: Institutionalizing Good Cybersecurity Ideas Wed, 31 Dec 2025 - 0h
-
167 - Episode 167: Volunteers as a Critical Cybersecurity Resource Wed, 24 Dec 2025 - 0h
-
166 - Episode 166: Foundations of Actuarial Science in Cyber Risk Wed, 17 Dec 2025 - 0h
-
165 - Episode 165: An In-Depth Look at CIS Controls Implementation Wed, 10 Dec 2025 - 0h
-
164 - Episode 164: Secure by Design in Software Development Wed, 03 Dec 2025 - 0h
-
163 - Episode 163: K-12 Cybersecurity Made Practical Wed, 26 Nov 2025 - 0h
-
162 - Episode 162: A Managed Approach to a Managed Attack Surface Wed, 19 Nov 2025 - 0h
-
161 - Episode 161: An Ecosystem-Wide Approach to CNI Resilience Wed, 12 Nov 2025 - 0h
-
160 - Episode 160: Championing SME Security with the CIS Controls Wed, 05 Nov 2025 - 0h
-
159 - Episode 159: The Scariest Malware of 2025 Wed, 29 Oct 2025 - 0h
-
158 - Episode 158: Scaling CMMC Compliance with Nerdio Wed, 22 Oct 2025 - 0h
-
157 - Episode 157: How a Modern, Mission-Driven CIRT Operates Wed, 15 Oct 2025 - 0h
-
156 - Episode 156: How CIS Uses CIS Products and Services Wed, 08 Oct 2025 - 0h
-
155 - Episode 155: The Story of CIS 2.0 and Adapting to a New Era Wed, 01 Oct 2025 - 0h
-
154 - Episode 154: Integration of Incident Response into DevSecOps Wed, 24 Sep 2025 - 0h
-
153 - Episode 153: Advice for Newcomers to IT and Cybersecurity Wed, 17 Sep 2025 - 0h
-
152 - Episode 152: Driving Response Time While Enriching Telemetry Wed, 10 Sep 2025 - 0h
-
151 - Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2 Wed, 03 Sep 2025 - 0h
-
150 - Episode 150: A Roundtable Chat to Celebrate 150 Episodes Wed, 27 Aug 2025 - 0h
-
149 - Episode 149: Human Error, AI Missteps, and Other VM Risks Wed, 20 Aug 2025 - 0h
-
148 - Episode 148: How MDR Helps Shine a Light on Zero-Day Attacks Wed, 13 Aug 2025 - 0h
-
147 - Episode 147: Actualizing Threat Intel for Effective Defense Wed, 06 Aug 2025 - 0h
-
146 - Episode 146: What Security Looks Like for a Security Company Wed, 30 Jul 2025 - 0h
-
145 - Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1 Wed, 23 Jul 2025 - 0h
-
144 - Episode 144: Carrying on the MS-ISAC's Character and Culture Wed, 16 Jul 2025 - 0h
-
143 - Episode 143: Iran's Growing Multidimensional Threat Activity Wed, 09 Jul 2025 - 0h
-
142 - Episode 142: SLTTs and Their Nuanced Cybersecurity Needs Wed, 02 Jul 2025 - 0h
-
141 - Episode 141: A Human-Centered Take on Password Policies Wed, 25 Jun 2025 - 0h
-
140 - Episode 140: Threat-Informed Travel Safety Tips Wed, 18 Jun 2025 - 0h
-
139 - Episode 139: Community Building for the Cyber-Underserved Wed, 11 Jun 2025 - 0h
-
138 - Episode 138: The Use of GenAI to Refine Your TTX Development Wed, 04 Jun 2025 - 0h
-
137 - Episode 137: National Cybersecurity Through SLTT Resilience Wed, 28 May 2025 - 0h
-
136 - Episode 136: How WiCyS Advances Women in Cybersecurity Wed, 21 May 2025 - 0h
-
135 - Episode 135: Five Lightning Chats at RSAC Conference 2025 Wed, 14 May 2025 - 0h
-
134 - Episode 134: How GenAI Lowers Bar for Cyber Threat Actors Wed, 07 May 2025 - 0h
-
133 - Episode 133: DieNet's DDoS Hacktivism and Evolving TTPs Wed, 30 Apr 2025 - 0h
Mostrar más episodios
5