PoddsändningarNäringslivCybersecurity Where You Are (video)

Cybersecurity Where You Are (video)

Center for Internet Security
Cybersecurity Where You Are (video)
Senaste avsnittet

101 avsnitt

  • Cybersecurity Where You Are (video)

    Episode 103: Education vs. Experience in Cybersecurity

    2024-10-02 | 31 min.
    In episode 103 of Cybersecurity Where You Are, Sean Atkinson examines education and experience as pathways for new professionals to enter the cybersecurity industry.
    Here are some highlights from our episode:
    01:42. What's motivating Sean to talk about this topic
    03:32. The value of cybersecurity degrees
    05:17. The pros and cons of degree programs in cybersecurity
    07:47. How a cybersecurity certification compares to a degree
    10:57. Considerations for pursuing a certification in cybersecurity
    14:00. Using certifications to learn new technology paradigms
    16:54. Why a breadth of practical experience is important
    22:49. Pathways for gaining experience in cybersecurity
    Resources
    Episode 75: How GenAI Continues to Reshape Cybersecurity
    Episode 59: Probing the Modern Role of the Pentest
    Outliers: The Story of Success
    Hack The Box
    TryHackMe
    David Bombal
    IppSec
    PortSwigger
    John Hammond
    If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
  • Cybersecurity Where You Are (video)

    Episode 101: Visualizing Attack Paths in Active Directory

    2024-9-18 | 34 min.
    In episode 101 of Cybersecurity Where You Are, Sean Atkinson is joined by Justin Kohler, Vice President of Products at SpecterOps, and Jonathan Parfait, Technical Account Manager at SpecterOps.
    Together, they discuss how the visualization of attack paths in Active Directory helps organizations to better contextualize risks to their enterprise security.
    Here are some highlights from our episode:
    01:54. What Bloodhound is and how it assists organizations in assessing risks in their Active Directory environments
    05:08. Why have organizations look at their Active Directory environments
    11:15. Common vulnerabilities and misconfigurations identified by Bloodhound
    21:21. How organizations can best use Bloodhound as part of their cyber defensive strategy
    29:18. How Bloodhound is adapting to keep up with evolving Active Directory environments
    Resources
    Bloodhound Community Edition
    Episode 62: Inside the 'Spidey Sense' of a Pentester
    What You Need to Know About Hybrid Cloud Environments
    Vulnerability Management Policy Template for CIS Control 7
    CIS Benchmarks List
    If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
  • Cybersecurity Where You Are (video)

    Episode 99: How Cyber-Informed Engineering Builds Resilience

    2024-9-04 | 34 min.
    In episode 99 of Cybersecurity Where You Are, Sean Atkinson is joined by Marcus Sachs, SVP and Chief Engineer at the Center for Internet Security® (CIS®).
    Together, they discuss how cyber-informed engineering builds resilience to the potential failure of a digital system into new and existing engineering products.
    Here are some highlights from our episode:
    03:51. What cyber-informed engineering is and how this paradigm has emerged
    11:39. What CIS is doing to emphasize cyber-informed engineering among U.S. State, Local, Tribal, and Territorial (SLTT) government organizations
    16:25. Why resilience requires everyone to be "cyber-informed"
    20:50. The need for boards of directors and C-Suite leaders to understand cybersecurity risk
    25:30. What preparations help to lay the foundation for cyber-informed engineering
    Resources
    Cyber-Informed Engineering
    National Cyber-Informed Engineering Strategy
    Cyber-Informed Engineering Implementation Guide
    Episode 75: How GenAI Continues to Reshape Cybersecurity
    Smart Cities Need Smarter Security
    If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
  • Cybersecurity Where You Are (video)

    Episode 98: Transparency as a Tool to Combat Insider Threats

    2024-8-28 | 35 min.
    In episode 98 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
    Together, they embrace transparency as a vehicle for the cybersecurity industry to better defend against insider threats.
    Here are some highlights from our episode:
    01:28. How KnowBe4 detected an insider threat from North Korea
    09:09. How the Center for Internet Security® (CIS®) responded to news of this incident
    21:02. The role of technical controls in detecting these types of threats
    23:56. Common signs you can use to detect fake employees in your hiring process
    29:22. How cybersecurity companies can use this incident to improve their defenses
    Resources
    How a North Korean Fake IT Worker Tried to Infiltrate Us
    North Korean Fake IT Worker FAQ
    Episode 77: Data's Value to Decision-Making in Cybersecurity
    Defense-in-Depth: A Necessary Approach to Cloud Security
    eBook: A CISO’s Guide to Bolstering Cybersecurity Posture
    If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].
  • Cybersecurity Where You Are (video)

    Episode 97: How Far We've Come preceding CIS's 25th Birthday

    2024-8-21 | 51 min.
    In episode 97 of Cybersecurity Where You Are, Tony Sager is joined by the following guests:
    Dr. Ramon Barquin, Board Member at the Center for Internet Security® (CIS®) and President and Chief Executive Officer at Barquin International
    Franklin Reeder, Director Emeritus and Founding Chair of CIS as well as Director of the National Cybersecurity Scholarship Foundation
    Clint Kreitner, Founding President/CEO and Former Board Member at CIS
    Together, they look back at how much CIS has accomplished as an organization in the leadup to its 25th birthday.
    Here are some highlights from our episode:
    06:04. What brought everyone to CIS's founding meeting at the Cosmos Club
    16:08. The first steps to operationalizing the takeaways of the Cosmos Club meeting
    25:40. How CIS's business model came to be
    34:24. The events that brought the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) into CIS
    42:42. Tracing the past forward to where we are now
    Resources
    20 Years of Creating Confidence in the Connected World
    Episode 35: Remembering the Late Alan Paller
    Reasonable Cybersecurity Guide
    Episode 79: Advancing Common Good in Cybersecurity – Part 1
    MS-ISAC: 20 Years as Your Trusted Cyber Defense Community
    Dr. Ramon Barquin
    Franklin Reeder
    If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

Fler podcasts i Näringsliv

Om Cybersecurity Where You Are (video)

Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the audio version of our podcast here: https://fast.wistia.net/embed/channel/wbyhaw35xf?wchannelid=wbyhaw35xf.
Podcast-webbplats

Lyssna på Cybersecurity Where You Are (video), Framgångspodden och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner

Cybersecurity Where You Are (video): Poddsändningar i Familj

Sociala nätverk
v8.3.1 | © 2007-2026 radio.de GmbH
Generated: 2/1/2026 - 12:49:05 PM