Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

84 Results Found
71 - 80 of 84 results
Episode 14: The Top 5 Cybersecurity Tips for the Family
Published on 08.31.2021
Episode 14: The Top 5 Cybersecurity Tips for the Family
The Top 5 Cybersecurity Tips for the Family In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean A...

Episode 13: What’s Important to You in Cybersecurity? A Host Q&A
Published on 08.20.2021
Episode 13: What’s Important to You in Cybersecurity? A Host Q&A
What’s Important to You in Cybersecurity? A Host Q&A In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO...

Episode 12: Cybersecurity and Government: Less Wizardry, More Policy
Published on 07.30.2021
Episode 12: Cybersecurity and Government: Less Wizardry, More Policy
Cybersecurity and Government: Less Wizardry, More Policy It can appear that cybersecurity practices are being built on the creative wizardry of t...

Episode 11: Remote Attestation Helps Zero Trust
Published on 07.16.2021
Episode 11: Remote Attestation Helps Zero Trust
Remote Attestation Helps Zero Trust Zero trust is an important information security architectural shift. Cyber breaches have increased in intensi...

Episode 10: Hospitals in Need of Cybersecurity STAT!
Published on 06.25.2021
Episode 10: Hospitals in Need of Cybersecurity STAT!
Hospitals in Need of Cybersecurity STAT! The medical industry is an appealing target for cyber-attackers due to the vast personal information hos...

Episode 9: Mitigating Risk: Information Security Governance
Published on 06.11.2021
Episode 9: Mitigating Risk: Information Security Governance
Mitigating Risk: Information Security Governance Information security governance ensures that an organization has the correct information structu...

Episode 8: CIS Controls v8…First Impressions
Published on 05.28.2021
Episode 8: CIS Controls v8…First Impressions
CIS Controls v8…First Impressions Part 2 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, host an...

Episode 7: CIS Controls v8…It’s Not About the List
Published on 05.14.2021
Episode 7: CIS Controls v8…It’s Not About the List
CIS Controls v8…It’s Not About the List Part 1 of a 2-part series on the CIS Controls v8 update In this edition of Cybersecurity Where You Are, h...

Episode 6: 2020 Elections Year in Review
Published on 04.23.2021
Episode 6: 2020 Elections Year in Review
2020 Elections Year in Review In this edition of Cybersecurity Where You Are, host and CISO at the Center for Internet Security (CIS), Sean Atkin...

Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive Process
Published on 04.09.2021
Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive Process
The Tools of Cyber Defense…an Ongoing, Repetitive Process Part 2 of a 2-part series In this week’s Cybersecurity Where You Are podcast, hosts Ton...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions