Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

98 Results Found
71 - 80 of 98 results
Episode 28: The Convergence of Cybersecurity and Public Policy
Published on 04.08.2022
Episode 28: The Convergence of Cybersecurity and Public Policy
In episode 28 of Cybersecurity Where You Are co-hosts Tony Sager and Sean Atkinson are joined by Brian Ray, an academic lawyer from Ohio

Episode 27: Cyber Scams
Published on 03.29.2022
Episode 27: Cyber Scams
Episode 27 focuses on the common cyber scams malicious actors have been using for decades and offer advice for dealing with them.

Episode 26: Automating the Secure Configuration Management Process
Published on 03.11.2022
Episode 26: Automating the Secure Configuration Management Process
In episode 26 of Cybersecurity Where You Are, Tony Sager and guest Brian Hajost of SteelCloud discuss issues around secure configuration manageme...

Episode 25 - Building an Internal Incident Response Team
Published on 02.25.2022
Episode 25 - Building an Internal Incident Response Team
Episode 25 covers the importance of an internal incident response team and provides guidance on skills needed and tactics that can be used to imp...

Episode 24: How Do I Start a Career in Cybersecurity?
Published on 02.11.2022
Episode 24: How Do I Start a Career in Cybersecurity?
In episode 24 of Cybersecurity Where You Are, co-host Tony Sager poses the question that many people interested in the industry ask: How do I sta...

Episode 23: Cybersecurity Predictions for 2022
Published on 01.31.2022
Episode 23: Cybersecurity Predictions for 2022
In Episode 23 of Cybersecurity Where You Are, hosts Tony Sager and Sean Atkinson are joined by our Senior Vice President of Operations and S...

Episode 22: CIS Behind the Veil: Log4j
Published on 01.24.2022
Episode 22: CIS Behind the Veil: Log4j
This podcast discusses what steps CIS took to address the Log4j vulnerability.

Episode 21: Year In Review; A List of our Favorite Episodes
Published on 12.28.2021
Episode 21: Year In Review; A List of our Favorite Episodes
In this edition of Cybersecurity Where You Are, CIS CISO, Sean Atkinson, and CIS Senior VP and Chief Evangelist, Tony Sager are joined by two mem...

Episode 20: The State of Election Cybersecurity
Published on 12.13.2021
Episode 20: The State of Election Cybersecurity
In this edition of Cybersecurity Where You Are, CIS Senior VP and Chief Evangelist, Tony Sager welcomes Kathy Boockvar, Vice President of Electio...

Episode 19: For Data Compliance, Automation is Key
Published on 11.15.2021
Episode 19: For Data Compliance, Automation is Key
In this edition of Cybersecurity Where You Are, CIS Senior VP and Chief Evangelist, Tony Sager welcomes Thordis Thorsteins, Senior Data Scientist...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions