Cybersecurity Where You Are (audio)
Episodes
Episode 67: Seizing the Moment after a Cybersecurity Audit
13 Oct 2023
Contributed by Lukas
In episode 67 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Stephanie Gass, Director of Governance, Risk, and Compliance at the C...
Episode 66: How RABET-V Verifies Non-Voting Election Tech
06 Oct 2023
Contributed by Lukas
In episode 66 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Mike Garcia, Senior Cybersecurity Advisor at the Cen...
Episode 65: Making Cyber Risk Analysis Practical with QRA
29 Sep 2023
Contributed by Lukas
In episode 65 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Christopher Painter, Board Member of the Center for Internet Security...
Episode 64: Defining Your Data Management Standards
15 Sep 2023
Contributed by Lukas
In episode 64 of Cybersecurity Where You Are, co-host Sean Atkinson initiates a series around establishing an underlying policy for your organization'...
Episode 63: Building Capability and Integration with SBOMs
01 Sep 2023
Contributed by Lukas
In episode 63 of Cybersecurity Where You Are, co-host Sean Atkinson discusses software bills of materials (SBOMs). He uses CISA and other resources to...
Episode 62: Inside the 'Spidey Sense' of a Pentester
18 Aug 2023
Contributed by Lukas
In episode 62 of Cybersecurity Where You Are, co-host Sean Atkinson sits down with Chris Elgee, Senior Security Analyst at Counter Hack; and Erik Purs...
Episode 61: Overcoming Pre-Audit Scaries Through Governance
04 Aug 2023
Contributed by Lukas
In episode 61 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Stephanie Gass, Director of Governance, Risk, and Co...
Episode 60: Guiding Vendors to IoT Security by Design
21 Jul 2023
Contributed by Lukas
In episode 60 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Kathleen Moriarty, CTO at the Center for Internet Security (CIS); Ben...
Episode 59: Probing the Modern Role of the Pentest
07 Jul 2023
Contributed by Lukas
In episode 59 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Ed Skoudis, founder of the SANS Penetration Testing ...
Episode 58: Inside CIS's Award-Winning Workplace Culture
23 Jun 2023
Contributed by Lukas
In episode 58 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by more than a dozen Center for Internet Security (CIS) employees during...
Episode 57: Celebrating the 20th Anniversary of the MS-ISAC!
09 Jun 2023
Contributed by Lukas
In episode 57 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by the following guests: William Pelgrin, Founder and F...
Episode 56: Cybersecurity Risks and Rewards of LLMs
26 May 2023
Contributed by Lukas
In episode 56 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Dr. Paulo Shakarian, Associate Professor at the School of Computing, ...
Episode 55: Live at RSA Conference 2023
12 May 2023
Contributed by Lukas
In episode 55 of Cybersecurity Where You Are, co-host Sean Atkinson speaks with experts in attendance at RSA Conference 2023. He asks nearly a dozen d...
Episode 54: How to Get Started in Cybersecurity
28 Apr 2023
Contributed by Lukas
In episode 54 of Cybersecurity Where You Are, co-host Sean Atkinson addresses how to get started in cybersecurity. He begins by looking at the differe...
Episode 53: Fostering a Neurodiverse Cybersecurity Industry
14 Apr 2023
Contributed by Lukas
In episode 53 of Cybersecurity Where You Are, co-host Tony Sager is joined by Ron Gula, President and Co-Founder of Gula Tech Foundation. Together, th...
Episode 52: Back in the Buzz of RSA Conference
31 Mar 2023
Contributed by Lukas
In episode 52 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss RSA Conference 2023. Together, they point out that the ann...
Episode 51: Making a Roadmap for Your Cybersecurity Journey
15 Mar 2023
Contributed by Lukas
In episode 51 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss the strategic importance of using a roadmap to navigate yo...
Episode 50: The Best of Cybersecurity Where You Are
03 Mar 2023
Contributed by Lukas
In episode 50 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Randy Rose, Sr. Director of Security Operations &...
Episode 49: Artificial Intelligence and Cybersecurity
17 Feb 2023
Contributed by Lukas
In episode 49 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss artificial intelligence (AI) and cybersecurity. The two re...
Episode 48: 3 Trends to Watch in the Cybersecurity Industry
03 Feb 2023
Contributed by Lukas
In episode 48 of Cybersecurity Where You Are, co-host Sean Atkinson introduces three trends within the cybersecurity industry that we'll discuss in up...
Episode 47: How Security and Compliance Support Each Other
06 Jan 2023
Contributed by Lukas
In episode 47 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Sawyer Miller, Senior Manager of Cyber Risk at risk3sixty LLC. Togeth...
Episode 46: Integration as a Theme for 2023
30 Dec 2022
Contributed by Lukas
In episode 46 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss their cybersecurity predictions for 2023 along with those ...
Episode 45: The Importance of Mentorship
16 Dec 2022
Contributed by Lukas
In episode 45 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Valecia Stocchetti who is a Sr. Cybersecurity Engine...
Episode 44: A Zero Trust Framework Knows No End
02 Dec 2022
Contributed by Lukas
In episode 44 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Scott Hall, Security Architect at the Center for Internet Security (C...
Episode 43: Giving Back Through CIS CARES
18 Nov 2022
Contributed by Lukas
In episode 43 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Amanda Flynn, Manager of Admin Services and Board Re...
Episode 42: Advocacy for the Underserved
28 Oct 2022
Contributed by Lukas
In episode 42 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Mat Everman, Information Security Operations Manager at the Center fo...
Episode 41: A Blueprint for Ransomware Defense
21 Oct 2022
Contributed by Lukas
In episode 41 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Valecia Stocchetti, Sr. Cybersecurity Engineer of the CIS Critical Se...
Episode 40 See Yourself in Cyber to Be Cyber Smart
07 Oct 2022
Contributed by Lukas
In episode 40 of Cybersecurity Where You Are, co-host Tony Sager is joined by Murray Kenyon, Vice Cybersecurity Partnerships Executive at U.S. Bank. T...
Episode 39: Cybersecurity at Scale
16 Sep 2022
Contributed by Lukas
In episode 39 of Cybersecurity Where You Are, CIS's Chief Information Security Officer Sean Atkinson discusses the importance of scaling in relation t...
Episode 38: How the Cyber Threat Landscape Is Changing
02 Sep 2022
Contributed by Lukas
In episode 38 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Theodore "TJ" Sayers, Manager of the Cyber Threat Intelligence (CTI) ...
Episode 37: Collaboration at the 15th Annual MS-ISAC Meeting
19 Aug 2022
Contributed by Lukas
In episode 37 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Carlos Kizzee, SVP of CIS Stakeholder Engagement Ope...
Episode 36: Strong Elections are Cyber STRONG
05 Aug 2022
Contributed by Lukas
In episode 36 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Marci Andino, Sr. Director of the Elections Infrastructure Informatio...
Episode 35: Remembering the Late Alan Paller
15 Jul 2022
Contributed by Lukas
In episode 35 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Bobbie Stempfley, Board Chair at the Center for Inte...
Episode 34: A Survey of Hacking in Hollywood
08 Jul 2022
Contributed by Lukas
In episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee, a senior security analyst and Core NetWars Tournament design lead...
Episode 33" The Shift-Left of IoT Security to Vendors
27 Jun 2022
Contributed by Lukas
In episode 33 of Cybersecurity Where You Are, co-host Sean Atkinson and Ben Carter, IoT Specialist for CIS’s Chief Technology Officer, discuss the n...
Episode 32: What You Need to Know Ahead of RSA 2022
03 Jun 2022
Contributed by Lukas
In episode 32 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss RSA 2022 — which is always a highlight of our conference...
Episode 31: To Achieve ICS Security Today, Look to Yesterday
19 May 2022
Contributed by Lukas
In episode 31 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Karen Sorady, VP for Multi-State Information Sharing and Analysis Cen...
Episode 30: Solving Cybersecurity at Scale with Nonprofits
06 May 2022
Contributed by Lukas
In episode 30 of Cybersecurity Where You Are, co-host Tony Sager is joined by Philip Reitinger, President and CEO of the Global Cyber Alliance. Their ...
Episode 29: Conceptualizing Reasonableness for Risk Analysis
28 Apr 2022
Contributed by Lukas
In episode 29 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Chris Cronin, ISO 27001 Auditor and Partner at HALOC...
Episode 28: The Convergence of Cybersecurity and Public Policy
08 Apr 2022
Contributed by Lukas
In episode 28 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Brian Ray, Director of the Center for Cybersecurity ...
Episode 27: Cyber Scams
29 Mar 2022
Contributed by Lukas
In this episode of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Stacey Wright, former CIS employee and current Vic...
Episode 26: Automating the Secure Configuration Management Process
11 Mar 2022
Contributed by Lukas
ResourcesFollow Brian Hajost on LinkedInPrioritizing a Zero Trust Journey Using CIS Controls v8Webinar | Align and Achieve CMMC Compliance Utilizing C...
Episode 25: Building an Internal Incident Response Team
25 Feb 2022
Contributed by Lukas
In this episode of Cybersecurity Where You Are, co-host Sean Atkinson is joined by Lou Smith, a Senior Information Security Intrusion Analyst at the C...
Episode 24: How Do I Start a Career in Cybersecurity?
11 Feb 2022
Contributed by Lukas
ResourcesFollow Guest Linnie Meehan on Twitter and TwitchUS Cyber Challenge (USCC)CyberStart AmericaCareer Opportunities at CIS11 of the Coolest Techn...
Episode 23: Cybersecurity Predictions for 2022
31 Jan 2022
Contributed by Lukas
In Episode 23 of Cybersecurity Where You Are, hosts Tony Sager and Sean Atkinson are joined by our Vice President of Operations and Security Services,...
Episode 22: CIS Behind the Veil: Log4j
21 Jan 2022
Contributed by Lukas
Resources:Information on Log4jCIS Critical Security ControlsEssential Cyber Hygiene In early January, the cybersecurity world was introduced to a...
Episode 21: Year In Review; A List of our Favorite Episodes
28 Dec 2021
Contributed by Lukas
In this edition of Cybersecurity Where You Are, CIS CISO, Sean Atkinson, and CIS Senior VP and Chief Evangelist, Tony Sager are joined by two members ...
Episode 20: The State of Election Cybersecurity
13 Dec 2021
Contributed by Lukas
Resources:Learn more about the EI-ISAC Election security tools and resourcesIn this edition of Cybersecurity Where You Are, CIS Senior VP and Chief Ev...
Episode 19: For Data Compliance, Automation is Key
15 Nov 2021
Contributed by Lukas
Resources:CIS Critical Security ControlsAbout PanaseerIn this edition of Cybersecurity Where You Are, CIS Senior VP and Chief Evangelist, Tony Sager w...
Episode 18: Top 5 Scariest Malware
29 Oct 2021
Contributed by Lukas
Resources:Monthly Top 10 MalwareCIS Critical Security ControlsAbout the MS-ISACIn this edition of Cybersecurity Where You Are, CIS Chief Information S...
Episode 17: Cybersecurity Awareness Month: It's All About the Big Picture
13 Oct 2021
Contributed by Lukas
ResourcesCybersecurity Awareness MonthCIS Community Defense Model 2.0Verizon Data Breach Investigations Report SANS Security Awareness TrainingMITRE A...
Episode 16: Cybersecurity: Think INSIDE the Box
27 Sep 2021
Contributed by Lukas
Resources:About Kathleen MoriartyCIS BenchmarksCIS Critical Security ControlsTools for Vendors and ConsultantsIn this edition of Cybersecurity Where Y...
Episode 15: Cybersecurity Success Takes Soft Skills
10 Sep 2021
Contributed by Lukas
Episode Highlights:Why soft skills are importantTop soft skillsBuilding a company cultureResources:CIS CareersPublication: Cybersecurity QuarterlyIn t...
Episode 14: The Top 5 Cybersecurity Tips for the Family
01 Sep 2021
Contributed by Lukas
Resources:Useapassphrase.comPassword Policy GuideRelated Blog: Password Policy Guide: Passphrases, Monitoring and MoreNational Cybersecurity Awareness...
Episode 13: What's Important to You in Cybersecurity? A Host Q&A
23 Aug 2021
Contributed by Lukas
Resources:CIS TwitterCIS LinkedInCIS Critical Security ControlsRelated podcast: RC Manager at Frame.io, Mosi Platt answers the Atkinson 9In this editi...
Episode 12: Cybersecurity and Government: Less Wizardry, More Policy
30 Jul 2021
Contributed by Lukas
This week’s Cybersecurity Where You Are podcast highlights:The problem regulating cybersecurityCybersecurity is currently the "Wild West"What makes ...
Episode 11: Remote Attestation Helps Zero Trust
16 Jul 2021
Contributed by Lukas
This week’s Cybersecurity Where You Are podcast highlights:Automated attestation processesVendor attestation capabilitiesRoot of trust via Trusted P...
Episode 10: Hospitals in Need of Cybersecurity STAT!
28 Jun 2021
Contributed by Lukas
This week’s Cybersecurity Where You Are podcast highlights:Why the medical industry is so appealing to attackersThe challenges of protecting medical...
Episode 9: Mitigating Risk: Information Security Governance
11 Jun 2021
Contributed by Lukas
Resources:Visit the CIS WebsiteHighlights:The importance of information security governanceSecurity vs. complianceData – determining what you need a...
Episode 8: CIS Controls v8...First Impressions
28 May 2021
Contributed by Lukas
Resources:Visit the CIS WebsiteDownload the CIS Controls v8Download CIS Controls v8 Change LogJoin a CIS Controls CommunityHighlights:Everything has t...
Episode 7: CIS Controls v8...It’s Not About the List
14 May 2021
Contributed by Lukas
Resources:What are the CIS ControlsLearn more about CIS Controls v8Free Webinar | May 18, 2021: Sign up to hear about all the changes to the CIS Contr...
Episode 6: 2020 Elections Year in Review
23 Apr 2021
Contributed by Lukas
Resources:EI-ISACElections Security Tools & Resources#PROTECT2020In this edition of Cybersecurity Where You Are, host and CISO at the Center for I...
Episode 5: The Tools of Cyber Defense...an Ongoing, Repetitive Process
12 Apr 2021
Contributed by Lukas
Part 2 of a 2-part seriesResources:Listen to Part 1CIS websiteCIS SecureSuite Tools and ResourcesCIS BenchmarksCIS Controls (v8 coming Spring 2021)CIS...
Episode 4: Dynamics of Cyber Defense...an Ongoing, Repetitive Process
26 Mar 2021
Contributed by Lukas
Episode Resources:Blog: Assess, Remediate, and Implement with CIS SecureSuite: https://www.cisecurity.org/blog/assess-remediate-and-implement-with-cis...
Episode 3: Third-party Risk Management – Beyond the Questionnaire
12 Mar 2021
Contributed by Lukas
Resources:Find us at https://www.cisecurity.org/Third-party Risk Association: https://www.tprassociation.org/ National Institute of Standards and Tech...
Episode 2: Trends: Then, Now, and Into the Future
05 Mar 2021
Contributed by Lukas
ResourcesFind us at https://www.cisecurity.org/Blog: 2021 Cybersecurity Trends to Prepare For: https://www.cisecurity.org/blog/2021-cybersecurity-tren...
Episode 1: Welcome to the Basics
27 Jan 2021
Contributed by Lukas
Co-hosts Sean Atkinson and Tony Sager welcome you to the CIS podcast Cybersecurity Where you Are.This episode gives you an overview of what the Center...