Cybersecurity Where You Are – Details, episodes & analysis

Podcast details

Technical and general information from the podcast's RSS feed.

Cybersecurity Where You Are

Cybersecurity Where You Are

Center for Internet Security

Technology
Business

Frequency: 1 episode/16d. Total Eps: 100

Wistia
Welcome to “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world.
Site
RSS
Apple

Recent rankings

Latest chart positions across Apple Podcasts and Spotify rankings.

Apple Podcasts

  • 🇫🇷 France - technology

    30/09/2024
    #100
  • 🇫🇷 France - technology

    25/09/2024
    #92

Spotify

    No recent rankings available



RSS feed quality and score

Technical evaluation of the podcast's RSS feed quality and structure.

See all
RSS feed quality
To improve

Score global : 58%


Publication history

Monthly episode publishing history over the past years.

Episodes published by month in

Latest published episodes

Recent episodes with titles, durations, and descriptions.

See all

Episode 101: Visualizing Attack Paths in Active Directory

Episode 101

mercredi 18 septembre 2024Duration 34:14

In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.

Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.

Here are some highlights from our episode:

  • 01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
  • 05:08. Why have organizations look at their Active Directory environments
  • 11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
  • 21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
  • 29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 99: How Cyber-Informed Engineering Builds Resilience

Episode 99

mercredi 4 septembre 2024Duration 34:23

In episode 99 of Cybersecurity Where You Are, Sean Atkinson is joined by Marcus Sachs, SVP and Chief Engineer at the Center for Internet Security® (CIS®).

Together, they discuss how cyber-informed engineering builds resilience to the potential failure of a digital system into new and existing engineering products.

Here are some highlights from our episode:

  • 03:51. What cyber-informed engineering is and how this paradigm has emerged
  • 11:39. What CIS is doing to emphasize cyber-informed engineering among U.S. State, Local, Tribal, and Territorial (SLTT) government organizations
  • 16:25. Why resilience requires everyone to be "cyber-informed"
  • 20:50. The need for boards of directors and C-Suite leaders to understand cybersecurity risk
  • 25:30. What preparations help to lay the foundation for cyber-informed engineering

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 90: Migrating to the Cloud with Control Continuity

Episode 90

mercredi 3 juillet 2024Duration 31:05

In episode 90 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by the following guests:

  • Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®)
  • Mia LaVada, Product Manager of CIS Benchmarks and Cloud at CIS
  • Don Freeley, VP of IT Services at CIS

Together, they discuss how you can use CIS resources to ensure control continuity when migrating to the cloud.

Here are some highlights from our episode:

  • 01:35. The biggest drivers for why organizations are moving to the cloud
  • 02:42. Foundational factors to consider as part of your cloud migration
  • 07:24. Resources from CIS designed to help you in your transition to the cloud
  • 11:00. Common challenges of migrating to the cloud
  • 14:37. The importance of three CIS Controls to your cloud security program
  • 18:35. The value of partnerships and community in driving cloud security improvements
  • 19:32. How you can use the CIS Foundations Benchmarks to get started in the cloud
  • 23:06. Inside the human and process side of moving to the cloud

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 89: How Threat Actors Are Using GenAI as an Enabler

Episode 89

mercredi 26 juin 2024Duration 31:17

In episode 89 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by the following guests:

  • Rian Davis, Elections Cyber Threat Intelligence Intern at the Center for Internet Security® (CIS®)
  • Timothy Davis, Sr. Elections Cyber Threat Intelligence Analyst at CIS

Together, they discuss how cyber threat actors (CTAs) are using generative artificial intelligence (GenAI) as an enabler of their attacks.

Here are some highlights from our episode:

  • 01:04. Why it's important to raise awareness of how CTAs are using GenAI
  • 01:59. How the CIS Cyber Threat Intelligence (CTI) team is seeing generative AI in CTAs' attack methodology
  • 03:50. The types of attacks that are using this technology and how the frequency of those attacks is changing
  • 05:46. Some notable attacks that have used GenAI in their methodology
  • 16:10. The ways in which CTAs are incorporating generative AI into social engineering
  • 24:17. What defenders can do in response to CTAs' use of GenAI

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 88: The Evolution of the Role of a CISO

Episode 88

mercredi 19 juin 2024Duration 30:02

In episode 88 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the evolving role of a chief information security officer (CISO).

Here are some highlights from our episode:

  • 02:47. Why communication is a core competency for CISOs
  • 08:35. How to take a balanced approach when evaluating an organization's implementation of artificial intelligence (AI) and machine learning (ML)
  • 11:47. The role a CISO plays in integrating privacy requirements into the organization
  • 15:35. Thoughts on how you can start preparing for or moving into a CISO position
  • 19:12. A future outlook of the CISO role
  • 26:40. Average longevity of CISOs in their roles and how this affects a security posture

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 87: Marking 11 Years as a Verizon DBIR Contributor

Episode 87

mercredi 5 juin 2024Duration 38:41

In episode 87 of Cybersecurity Where You Are, co-host Tony Sager is joined by the following guests:

  • Charity Otwell, Director of the CIS Critical Security Controls® (CIS Controls®) at the Center for Internet Security® (CIS®)
  • Philippe Langlois, Senior Principal, Security Risk Management and Author of the Verizon Data Breach Investigations Report (DBIR)
  • Theodore "TJ" Sayers, Director of Intelligence & Incident Response at CIS

Together, they celebrate 11 years of CIS and Verizon working together to contextualize the threat activity security teams are seeing and to help teams use the Controls as an improvement framework.

Here are some highlights from our episode:

  • 02:00. How the Multi-State and Elections Infrastructure Information Sharing and Analysis Centers (MS-ISAC® and EI-ISAC®) contribute anonymized data to the Verizon DBIR
  • 07.27. The two types of data that Verizon uses as input for its report
  • 13:50. The ways CIS uses the content of Verizon's DBIR to help people embrace programs of security improvement
  • 24:48. A glimpse at what goes into producing the DBIR
  • 28.33. The importance of leadership in guiding team dynamics and fun
  • 32.07. Reception of the 2024 DBIR and exploration of what's next for the Verizon DBIR team

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 86 Evangelizing CIS's Message at RSAC 2024

Episode 86

mercredi 29 mai 2024Duration 34:07

In episode 86 of Cybersecurity Where You Are, co-host Sean Atkinson is live once again from Booth 4319 at RSA Conference (RSAC) 2024. 

00:57. Sean chats with Mat Everman, Information Security Operations Manager, about his talk, "Shades of Purple: Getting Started and Making Purple Teaming Possible." They discuss some of the questions Mat received following his talk and how they can put purple teaming into practice at the Center for Internet Security® (CIS®).

Sean asks passersby what they're looking to get out of RSAC 2024 and what stood out to them at the conference.

  • 13:56. José Mena, Founder of Digital Twin Networks
  • 20:34. Jonathan Kern, CEO of Castile Defense
  • 25:42. Ken Klestinec, Regional Sales Manager at Akamai

Finally, Sean talks to fellow team members about CIS's objective for RSAC 2024.

  • 18:10. Aaron Perkins, Director of Communications
  • 23:25. Nick Rust, Director of Reseller & Channel Partners
  • 27:04. Jeff Sparks, CIS Services Sr. Account Executive
  • 28:08. Mia LaVada, Product Manager of CIS Benchmarks and Cloud
  • 30:01. Mishal Makshood, Sr. Cloud Security Account Executive

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 85: Reenergizing Collective Action at RSAC 2024

Episode 85

mercredi 22 mai 2024Duration 50:51

In episode 85 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are live from Booth 4319 at RSA Conference (RSAC) 2024. Together, they discuss how events like RSAC 2024 reenergize collective action in the cybersecurity industry. They begin by noting how resources such as the CIS Community Defense Model (CDM) bring more data and transparency to security recommendations for the cybersecurity industry. They then look back on some of Tony's presentations at prior years of RSAC before looking at the interest surrounding supply chain security, zero trust, and artificial intelligence (AI). To address these developments, organizations must create a foundation for defense and scale rapid improvements, needs which Tony and Sean see as opportunities for collective action in the industry.

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 84: Why We Need to Define Reasonable Cybersecurity

Episode 84

mercredi 15 mai 2024Duration 40:08

In episode 84 of Cybersecurity Where You Are, co-host Tony Sager is joined by Brian de Vallance, Senior Advisor at Cambridge Global Advisors; and Phyllis Lee, VP of Security Best Practices (SBP) Content Development at the Center for Internet Security® (CIS®). Together, they discuss the notion of reasonable cybersecurity. They begin by providing some background about reasonableness in cybersecurity and identifying the problem we need to solve — namely, the lack of a definition of reasonableness around which organizations can build their cybersecurity program. They then discuss how a definition for reasonable cybersecurity needs to include security best practices that are doable. They conclude by exploring how CIS's work around this topic may influence its content development going forward.

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Episode 83: Why Meeting in Person Matters to CIS Employees

Episode 83

mercredi 1 mai 2024Duration 29:46

In episode 83 of Cybersecurity Where You Are, co-host Sean Atkinson is joined by nearly 20 employees at the Center for Internet Security® (CIS®). Together, they discuss the value of meeting in person to CIS workplace culture. With the company's 2024 Annual Full Staff Meeting in Orlando, FL, as their backdrop, they explore how personal relationships create a foundation for building effective teams, more agile workflows, and a sustainable sense of engagement and motivation at CIS. Along the way, they reflect on how much the company has changed since before the pandemic.

Resources

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.


Related Shows Based on Content Similarities

Discover shows related to Cybersecurity Where You Are, based on actual content similarities. Explore podcasts with similar topics, themes, and formats, backed by real data.
Thinking Elixir Podcast
Kubernetes Podcast from Google
CyberWire Daily
BrakeSec Education Podcast
Zimmerman en Space
The Atlas Obscura Podcast
All Things Internal Audit
Down the Security Rabbithole Podcast (DtSR)
NoLimitSecu
CISO Series Podcast
© My Podcast Data