
Player FM - Internet Radio Done Right
Checked 3d ago
Menambahkan three tahun yang lalu
Konten disediakan oleh David Bisson and Center for Internet Security. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh David Bisson and Center for Internet Security atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !
Offline dengan aplikasi Player FM !
Podcast Layak Disimak
DISPONSORI
I
In Her Ellement


1 Throwback: Role Modelling Vulnerability with Kensho’s Bhavesh Dayalji 25:46
25:46
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai25:46
What does allyship look like when you’re leading a company? For Bhavesh Dayalji, it often means being honest about the challenges of balancing work and family, and choosing to show up as a husband and father first. This is a throwback episode, but Bhavesh’s reflections on leadership and allyship remain just as powerful today. Bhavesh shares how vulnerability can build trust and create cultures where people feel safe bringing their full selves to work. It’s a principle that extends to how he approaches innovation in AI. Bhavesh is the CEO of Kensho Technologies, an AI solutions provider, and also serves as Chief AI Officer at S&P Global. 1:34 Meet Bhavesh 4:46 Seeing inequality in tech 6:17 AI at Kensho and S&P Global 9:21 Lessons from the CEO seat 11:26 Why diverse voices matter in AI 15:41 Being real at work 17:43 Advice for newcomers in AI 19:43 Family and balance Links: Bhavesh Diyalji on LinkedIn Suchi Srinivasan on LinkedIn Kamila Rakhimova on LinkedIn About In Her Ellement: In Her Ellement highlights the women and allies leading the charge in digital, business, and technology innovation. Through engaging conversations, the podcast explores their journeys—celebrating successes and acknowledging the balance between work and family. Most importantly, it asks: when was the moment you realized you hadn’t just arrived—you were truly in your element? About The Hosts: Kamila Rakhimova is a fintech leader whose journey took her from Tajikistan to the U.S., where she built a career on her own terms. Leveraging her English proficiency and international relations expertise, she discovered the power of microfinance and moved to the U.S., eventually leading Amazon's Alexa Fund to support underrepresented founders. Suchi Srinivasan is an expert in AI and digital transformation. Originally from India, her career includes roles at trailblazing organizations like Bell Labs and Microsoft. In 2011, she co-founded the Cleanweb Hackathon, a global initiative driving IT-powered climate solutions with over 10,000 members across 25+ countries. She also advises Women in Cloud, aiming to create $1B in economic opportunities for women entrepreneurs by 2030. Subscribe to In Her Ellement on your podcast app of choice to hear meaningful conversations with women in digital, business, and technology.…
Cybersecurity Where You Are (video)
Tandai semua (belum/sudah) diputar ...
Manage series 3382533
Konten disediakan oleh David Bisson and Center for Internet Security. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh David Bisson and Center for Internet Security atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the audio version of our podcast here: https://fast.wistia.net/embed/channel/wbyhaw35xf?wchannelid=wbyhaw35xf.
…
continue reading
153 episode
Tandai semua (belum/sudah) diputar ...
Manage series 3382533
Konten disediakan oleh David Bisson and Center for Internet Security. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh David Bisson and Center for Internet Security atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the audio version of our podcast here: https://fast.wistia.net/embed/channel/wbyhaw35xf?wchannelid=wbyhaw35xf.
…
continue reading
153 episode
Semua episode
×C
Cybersecurity Where You Are (video)

1 Episode 153: Advice for Newcomers to IT and Cybersecurity 36:37
36:37
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai36:37
In episode 153 of Cybersecurity Where You Are, Sean Atkinson is joined by Jason Ashong , IT Support Specialist at the Center for Internet Security® (CIS®). Jason shares his journey from tinkering with tech as a kid to working in IT and pursuing cybersecurity research. The conversation covers education, mentorship, hands-on experience, and advice for newcomers entering the field. Here are some highlights from our episode: 01:10 . Jason’s early days in IT of fixing devices and breaking things to learn 02:14 . First professional IT/helpdesk experience at Dutchess Community College 03:48 . The importance of mentors pushing you to grow 06:02 . Jason’s advice to students of understanding foundational computing knowledge 08:45 . The value of technical skills in networking, cryptography, and coding 11:00 . Hands-on experience through labs, competitions, and research projects 16:08 . Self-confidence, practice, and dedicated time as tips for navigating the job market 19:29 . The role of attitude in opening up new opportunities 24:40 . Jason flips the script and interviews Sean Mistakes to avoid when entering the field: imposter syndrome and perfectionism Cybersecurity as a path of continuous learning Opportunities for newcomers with experience in artificial intelligence and data science Resources Episode 129: Embedding Cybersecurity in Project Management Episode 95: AI Augmentation and Its Impact on Cyber Defense Episode 44: A Zero Trust Framework Knows No End TryHackMe Hack The Box If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 152: Driving Response Time While Enriching Telemetry 33:09
33:09
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:09
In episode 152 of Cybersecurity Where You Are, Sean Atkinson is joined by Cliff Moten , Manager, Cybersecurity Solutions Engineering at the Center for Internet Security® (CIS®); and Richard Vargas, Security Operations Center Manager at CIS. Together, they discuss how the 24x7x365 CIS Security Operations Center (SOC) and CIS Managed Detection and Response™ (CIS MDR™) work together to accelerate response time while enriching telemetry. Here are some highlights from our episode: 01:40 . Demystifying SOCs and MDR as cybersecurity concepts 02:52 . How the CIS SOC works to provide information, context, and next steps for an event 05:04 . Artificial intelligence and automation as ways to accelerate response time 10:20 . Real-world instances where a fast response time made a difference 13:10 . What it means to support underfunded organizations with the resources they need 17:22 . The role of contextual cyber threat intelligence in accelerating response times 19:01 . The value of security orchestration, automation, and response (SOAR) in helping defenders move quickly 27:33 . Lessons that organizations can use to cut down on their incident response times Resources The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity Episode 148: How MDR Helps Shine a Light on Zero-Day Attacks Episode 144: Carrying on the MS-ISAC's Character and Culture Episode 137: National Cybersecurity Through SLTT Resilience Combatting Ransomware Establishing Essential Cyber Hygiene CIS Community Defense Model 2.0 If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2 46:42
46:42
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai46:42
In episode 151 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode: 01:12 . The importance of consolidating security operations and using what already exists 03:18 . The promise of generative artificial intelligence (GenAI) in relieving grunt work 08:26 . The great responsibility and burden of integrating GenAI into business operations 10:53 . How control and inspection generate trust in systems 17:57 . Post-quantum cryptography, IoT in edge computing, and GenAI's sociopolitical risks 30:21 . The need for a more holistic understanding of compliance 33:34 . Why zero trust doesn't mean "no trust" 36:56 . The need for AI as an element of critical security control 41:33 . The dynamic challenge of protecting all assets with varying levels of security Resources 12 CIS Experts' Cybersecurity Predictions for 2025 Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1 Episode 135: Five Lightning Chats at RSAC Conference 2025 Establishing Essential Cyber Hygiene Episode 95: AI Augmentation and Its Impact on Cyber Defense Guide to Asset Classes: CIS Critical Security Controls v8.1 An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms An Introduction to Artificial Intelligence Episode 120: How Contextual Awareness Drives AI Governance Episode 118: Preparing for Post-Quantum Cryptography Episode 63: Building Capability and Integration with SBOMs Episode 99: How Cyber-Informed Engineering Builds Resilience Mapping and Compliance with the CIS Controls Mapping and Compliance with the CIS Benchmarks CIS Community Defense Model 2.0 If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 150: A Roundtable Chat to Celebrate 150 Episodes 33:27
33:27
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:27
In episode 150 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Chad Rogers , Sr. Manager, Digital Media Services, at the Center for Internet Security® (CIS®); Rudy Uhde , Video Editor at CIS; and David Bisson , Sr. Content Strategist at CIS. Together, they use a roundtable chat to celebrate 150 episodes of Cybersecurity Where You Are. Here are some highlights from our episode: 01:33 . How the cybersecurity landscape and podcast have changed since Episode 100 05:40 . The "labor of love" that goes into editing and preparing an episode for publication 12:13 . Memorable guests and moments that changed the team's thinking about cybersecurity 25:45 . How the larger podcast team drives continuous improvement and innovation 30:13 . Parting thoughts for the audience Resources Episode 100: Celebrating 100 Episodes and Looking Ahead Episode 149: Human Error, AI Missteps, and Other VM Risks Episode 9: Mitigating Risk: Information Security Governance Episode 96: Making Continuous Compliance Actionable for SMBs Episode 121: The Economics of Cybersecurity Decision-Making Episode 114: 3 Board Chairs Reflect on 25 Years of Community Episode 136: How WiCyS Advances Women in Cybersecurity Episode 120: How Contextual Awareness Drives AI Governance Episode 116: AI-Enhanced Ransomware and Defending Against It Episode 146: What Security Looks Like for a Security Company Episode 110: How Security Culture and Corporate Culture Mesh If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 149: Human Error, AI Missteps, and Other VM Risks 33:21
33:21
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:21
In episode 149 of Cybersecurity Where You Are, Sean Atkinson is joined by Chris McCullar , Director of Sales, Cloud Security, at the Center for Internet Security® (CIS®); and Mishal Makshood , Sr. Cloud Security Account Executive at CIS. Together, they discuss how to navigate human error, artificial intelligence (AI) missteps, and other landmarks in a new frontier of virtual machine (VM) risks. Here are some highlights from our episode: 00:50 . Introductions with Chris and Mishal 02:20 . The ongoing need to address the risk of human error when configuring VMs 04:55 . The value of building trusted security into a VM image by design 07:28 . A reality check of what the shared responsibility model means to an organization 13:06 . How the integration of AI into DevOps accelerates both automation and mistakes 15:21 . The importance of a secure foundation in the cloud on which you can build with AI 18:19 . Automated enforcement and AI's role in complementing human judgment 21:03 . Two examples how CIS resources can drive governance and policy integration 28:05 . Cybersecurity as a community-driven team sport 30:33 . Lifecycle management as a way of addressing organizations' security needs Resources Keep the Cloud Secure with CIS after Migrating to the Cloud Automated Compliance: The Byproduct of Holistic Hardening Meet the Shared Responsibility Model with New CIS Resources Episode 135: Five Lightning Chats at RSAC Conference 2025 2025 Data Breach Investigations Report If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 148: How MDR Helps Shine a Light on Zero-Day Attacks 32:15
32:15
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:15
In episode 148 of Cybersecurity Where You Are, Sean Atkinson is joined by Rob Reese, Cyber Incident Response Team Manager at the Center for Internet Security® (CIS®); Dustin Cox, Cyber Incident Response Team Analyst at CIS; and Cliff Moten , Manager, Cybersecurity Solutions Engineering at CIS. Together, they discuss how organizations can use Managed Detection and Response (MDR) tools to help defend against zero-day attacks. Here are some highlights from our episode: 01.06 . Demystifying zero-day vulnerabilities with a definition 02:36 . Why zero-day attacks are some of the most serious threats facing organizations today 04:19 . Examples of zero-day exploits and how these threats affect Incident Response (IR) 10:06 . The importance of understanding your environment and patch management 13:58 . How MDR assists with behavioral analysis, assembling holistic inventories, and IR 20:02 . The role of asset inventories in determining scope and containing a zero-day incident 24:08 . Why it's important to have humans managing and monitoring an MDR solution 27:11 . MDR as a means of centralizing evidence of a zero-day attack 30:05 . Parting thoughts for those concerned with their endpoint security posture Resources CIS Managed Detection and Response™ (CIS MDR) Multi-State Information Sharing and Analysis Center® CIS Critical Security Control 1: Inventory and Control of Enterprise Assets CIS Critical Security Control 2: Inventory and Control of Software Assets The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity Real-Time Indicator Feeds Incident Response Policy Template for CIS Control 17 If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 147: Actualizing Threat Intel for Effective Defense 43:11
43:11
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai43:11
In episode 147 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen , Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security® (CIS®); and Kaitlin Drape, Hybrid Threat Intelligence Analyst at CIS. Together, they discuss how to actualize threat intel for the purpose of building effective defense programs and operational response plans. Here are some highlights from our episode: 01:27 . Which two questions you want to answer when providing intelligence on a threat 05:19 . How to avoid underutilizing or misunderstanding the utility of threat intel 13.18 . A real-life story from John of when intelligence made a difference in a security incident 17:05 . The foundation and building blocks of maturing your threat intelligence program 22:14 . The value of working with non-intelligence groups to formulate effective response plans 24:22 . CIS's ongoing work to help organizations proactively ingest and use threat intel 28:24 . How cross-collaboration across an organization brings threat intel into a lifecycle 31:01 . Kaitlin's work as an exemplar of how to make threat intelligence operational 36:20 . The ongoing evolution of hybrid threat intel to inform meaningful operational responses Resources ThreatWA™ How Threat Modeling, Actor Attribution Grow Cyber Defenses Countering Multidimensional Threats: Lessons Learned from the 2024 Election Episode 119: Multidimensional Threat Defense at Large Events Sinaloa cartel used phone data and surveillance cameras to find FBI informants, DOJ says If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 146: What Security Looks Like for a Security Company 34:01
34:01
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai34:01
In episode 146 of Cybersecurity Where You Are, Tony Sager is joined by Angelo Marcotullio , Chief Information Officer at the Center for Internet Security®(CIS®); and Stephanie Gass, Sr. Director of Information Security at CIS. Together, they look back on periods of transition at CIS to discuss what security looks like for a security company. Here are some highlights from our episode: 00:58 . Introductions with Angelo and Stephanie 02:07 . A pro and a con of IT consulting work 04:12 . The importance of soft skills in bringing the Multi-State Information Sharing and Analysis Center® into CIS 06:12 . Looking at security from a corporate perspective with the CIS Critical Security Controls 07:08 . How IT and IT security are essential to corporate strategy 07:45 . The use of governance to support merging three business units into an integrated security company 12:04 . The value of security champions in adapting to regulatory and business changes 15:15 . What IT and Security teams can accomplish when they work as partners 17:18 . The use of data to inform Board decisions and conversations around risk 20:38 . How getting a seat at the table helps with understanding a Board's risk appetite and communicating that out to teams 25:01 . How infrastructure built for growth, not the smallest business case, produced a smooth transition to work from home in March 2020 29:30 . Advice for folks starting out in security 31.28 . The importance of collaboration and culture in implementing security as an organization Resources Episode 144: Carrying on the MS-ISAC's Character and Culture The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1 CIS Controls v8.1 Mapping to ISO/IEC 27001:2022 CIS Controls v8.1 Mapping to SOC2 CIS Controls v8.1 Mapping to NIST SP 800-171 Rev 3 Reasonable Cybersecurity Episode 110: How Security Culture and Corporate Culture Mesh If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1 35:33
35:33
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai35:33
In episode 145 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager begin their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode: 01:14 . Verizon's Data Breach Investigations Report as a source of enlightenment and humility 02:28 . The use of generative artificial intelligence (GenAI) to finely tune phishing emails 06:31 . Cyber threat actors' Darwinian efficiency in adopting new technology 07:50 . Policies, oversight, and compliance in slowing defenders' adoption of technology 10:30 . The two-sided, dynamic challenge of managing supply chain risk 18:23 . Cybersecurity as a strategic business investment in protecting revenue 20:40 . The value of partnerships in determining rational social expectations for cybersecurity 26:45 . Rapid recap of several of our 2025 cybersecurity predictions 28:43 . Designing technology with human awareness to create a culture of responsibility 32:29 . The need to rethink what "connected" means in our complex world Resources 12 CIS Experts' Cybersecurity Predictions for 2025 Episode 117: 2025 Cybersecurity Predictions from CIS Experts 2025 Data Breach Investigations Report 2024 DBIR Findings & How the CIS Critical Security Controls Can Help to Mitigate Risk to Your Organization Episode 119: Multidimensional Threat Defense at Large Events How to Construct a Sustainable GRC Program in 8 Steps Society of Information Risk Analysts Reasonable Cybersecurity Episode 135: Five Lightning Chats at RSAC Conference 2025 If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 144: Carrying on the MS-ISAC's Character and Culture 33:04
33:04
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:04
In episode 144 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Carlos Kizzee , Senior Vice President of Multi-State Information Sharing and Analysis Center® (MS-ISAC®) at the Center for Internet Security®(CIS®). Together, they discuss how the MS-ISAC's new funding model helps to carry on the character and culture of this collaborative cyber defense community. Here are some highlights from our episode: 01:11 . The unique mission, history, and value of building community at the MS-ISAC 05:36 . A new fee-based model to preserve services and support amid federal funding changes 07:08 . Service continuity as a commitment to U.S. State, Local, Tribal, and Territorial entities 09:45 . Initial feedback and considerations heard at the 2025 ISAC Annual Meeting 11:40 . The new membership funding model and how it preserves SLTT collaboration 15:25 . A cost-effective approach to securing the "cyber-underserved" 19:31 . The range of U.S. SLTT government organizations who can enroll as members now 21:59 . The illusion of "free" in helping U.S. SLTTs to strengthen their cyber defenses 22:55 . Why U.S. SLTTs need to enroll in paid MS-ISAC membership before October 1, 2025 28:03 . Scale as the key to making MS-ISAC activities as cost-effective as possible 30:05 . The essential need for U.S. SLTT government organizations to invest in the MS-ISAC Resources Multi-State Information Sharing and Analysis Center® Episode 142: SLTTs and Their Nuanced Cybersecurity Needs Episode 137: National Cybersecurity Through SLTT Resilience ISAC Annual Meeting MS-ISAC Membership Resources Become an MS-ISAC Member Episode 30: Solving Cybersecurity at Scale with Nonprofits If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 143: Iran's Growing Multidimensional Threat Activity 31:57
31:57
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai31:57
In episode 143 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen , Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss Iran's evolving multidimensional threat activity following U.S. airstrikes on Iranian nuclear facilities in June 2025. Here are some highlights from our episode: 00:49 . Lessons from the past on how Iran might respond to the U.S. airstrikes in June 2025 04:56 . The use of informed practice and continuous awareness to better prepare defenders 06:41 . Recap of Iranian multidimensional threat activity observed between 2024 and 2025 11:53 . The impact of contextual intelligence and education in driving threat awareness 19:17 . Why understanding of impact is critical to addressing a business risk 23:09 . Three things you need to do to be an effective threat briefer 25:07 . The use of tabletop exercises (TTXs) to promote incident response 26:56 . The 2024 General Election as a case study of what threat preparedness can do Resources ThreatWA™ US hits 3 Iranian nuclear sites, Trump says, plunging America into conflict Are national security threats a concern after U.S. military strike on Iranian nuclear sites? New report: Hacker for El Chapo helped boss hunt and kill FBI informants MS-ISAC Guide to DDoS Attacks With July 4 just days away, US law enforcement on high alert for Iran retaliation Iran-linked hackers threaten to release Trump aides' emails Iranian-aligned hackers claim responsibility for Truth Social cyberattack Iranian-Aligned Hackers Claim Responsibility for Attack on Trump’s Truth Social Platform States and Congress wrestle with cybersecurity after Iran attacks small town water utilities NYPD deploying additional resources across city following US strikes on Iran CIS Critical Security Controls v8.1 Industrial Control Systems (ICS) Guide Enhancing Safety in the Connected World — A National Framework for Action Episode 138: The Use of GenAI to Refine Your TTX Development Countering Multidimensional Threats: Lessons Learned from the 2024 Election If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 142: SLTTs and Their Nuanced Cybersecurity Needs 34:10
34:10
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai34:10
In episode 142 of Cybersecurity Where You Are, Sean Atkinson is joined by Anthony Essmaker , former Product Marketing Manager at the Center for Internet Security®(CIS®); and Randy Rose, VP of Security Operations & Intelligence at CIS. Together, they discuss the nuanced, empathetic approach that's required to help U.S. State, Local, Tribal, and Territorial (SLTT) government organizations to address their cybersecurity needs. Here are some highlights from our episode: 01.10 . What the acronym "SLTT" means to CIS's operational mission 05:39 . Using a flexible approach to support the different cybersecurity needs of the 50 states 09:43 . How different resources and experiences contextualize "best practices" at the local level 11:49 . Trivia question: Which two U.S. states don't have counties? 13:20. The complexity of cybersecurity challenges and resources for U.S. tribal entities 20:11 . A 20-year history of working with U.S. SLTTs to meet them where they are 21:30 . Relationships as the bedrock for a community model of SLTT cyber defense 26:29 . Geographical isolation and other factors affecting U.S. territories' cybersecurity needs 32:42 . A closing fun fact about the first U.S. fire district Resources Episode 123: An Operational Playbook for Security Impact The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity 2024 MS-ISAC Tribal Sector Cybersecurity Report Multi-State Information Sharing and Analysis Center® Nationwide Cybersecurity Review (NCSR) If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 141: A Human-Centered Take on Password Policies 43:18
43:18
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai43:18
In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee , VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney , Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of security to discuss password policies, including their benefits, drawbacks, and efficacy. Here are some highlights from our episode: 01:03 . Introductions to Phyllis and Julie 03:34 . How "human-centered cybersecurity" goes beyond just usability 05:35 . The use of NIST and other authoritative sources to dispel confusion in cybersecurity 09:09 . How password policies positively and negatively impact human behavior 15:06 . Three anecdotes that showcase the importance of context when enacting security policy 21:49 . The process of using NIST SP 800-63 to recommend password security best practices 27:11 . Our changing understanding of "the human element" 29:23 . The need to do cybersecurity awareness training "right" and measure its effectiveness 31:30 . Recognition of the absence of natural systems thinking in cybersecurity 33:14 . Psychological safety, feedback, and trust as foundations of security culture 39:03 . Human touchpoints as a starting point to help usability and security work together Resources CIS Password Policy Guide NIST SP 800-63 Digital Identity Guidelines Episode 98: Transparency as a Tool to Combat Insider Threats Episode 110: How Security Culture and Corporate Culture Mesh Why Employee Cybersecurity Awareness Training Is Important If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 140: Threat-Informed Travel Safety Tips 34:28
34:28
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai34:28
In episode 140 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen , Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss travel safety tips informed by today's evolving multidimensional threat environment. Here are some highlights from our episode: 01:30 . The most overlooked security risks we need to take seriously whenever we travel 03:42 . How threat actors can exploit our tendency to overshare online 07:25 . Top security practices you can use to safely plan your next trip 12:28 . The value of playing out your travels' worst-case scenario before you leave 16:02 . The benefits and drawbacks of using electronic navigations systems while traveling 18:00 . Videos as a means of attuning to the "flow" of a different place and/or culture 24:10 . Which types of people make attractive targets for foreign intelligence services 25:05 . Honeypot operations in the physical and digital worlds 27:24 . Opportunities to protect the technology on which we rely Resources ThreatWA™ Travel.State.Gov A Short Guide for Spotting Phishing Attempts 8 Security Essentials for Managing Your Online Presence Election Security Spotlight – Social Engineering If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 139: Community Building for the Cyber-Underserved 34:03
34:03
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai34:03
In episode 139 of Cybersecurity Where You Are, Tony Sager is joined by Amelia Gifford , Sr. Manager, Administration, at the Center for Internet Security®(CIS®); and George Bailey , Director of Purdue cyberTAP . Together, they discuss how the 2025 grant from the Alan Paller Laureate Program will support Purdue cyberTAP's mission of community building for the cyber-underserved. Here are some highlights from our episode: 01:02 . Honoring a legacy of making cybersecurity practical and accessible 03:34 . The business of giving products away to benefit the cybersecurity community 05:00 . The use of the CIS Critical Security Controls (CIS Controls) to help rural electricity cooperatives in Indiana 11:00 . Methodology, tooling, and repeatability as part of a lifecycle of realizing a good idea 11:56 . Cross-Mapping as a means to help people live with so many security frameworks 12:59 . Accountability and re-assessment as methods for measuring program success 14:59 . The power of community in prioritizing the CIS Controls 16:38 . Community building as a way to navigate the cybersecurity business together 17:42 . A controlled Controls experiment to generate data, learn lessons, and create feedback 19:03 . Progress reporting as a way to foster connections 24:39 . Feedback on the Alan Paller Laureate Program application process 26:30 . Focus on cybersecurity community impact as a consideration for future applicants 30:31 . Parting thoughts about the grant program and an invitation to reach out to George Resources Center for Internet Security Awards Nearly $250,000 to Purdue University’s Technical Assistance Program Episode 114: 3 Board Chairs Reflect on 25 Years of Community Episode 97: How Far We've Come preceding CIS's 25th Birthday CIS Critical Security Controls v8.1 Industrial Control Systems (ICS) Guide SEC366: CIS Implementation Group 1™ How to Plan a Cybersecurity Roadmap in 4 Steps CIS SecureSuite® Membership Mapping and Compliance with the CIS Controls Reasonable Cybersecurity Guide If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 138: The Use of GenAI to Refine Your TTX Development 33:54
33:54
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:54
In episode 138 of Cybersecurity Where You Are, Sean Atkinson is joined by Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security®(CIS®). Together, they discuss how organizations can use Generative Artificial Intelligence (GenAI) to refine how they develop Tabletop Exercises (TTXs). Here are some highlights from our episode: 01:49 . Why TTXs function as a "blue sky" opportunity for crisis management and preparedness 04:33 . A quick recap of how GenAI stands apart from traditional AI 06:19 . The direct relationship between input and output when measuring GenAI content quality 07:36 . TTXs as a use case for GenAI to help the "cyber-underserved" 10:14 . How GenAI can quickly customize TTXs for different organizations and threat models 13:56 . The use of GenAI to improve TTX facilitation, regularity, and cost 17:22 . GenAI as an inspiration to act on the findings of a simulation 18:26 . Risks and ethical concerns to keep in mind for GenAI-enhanced TTX development 24:46 . Where humans can still play a part in augmented exercises 30:08 . Closing thoughts about the future of GenAI Resources Leveraging Generative Artificial Intelligence for Tabletop Exercise Development Episode 134: How GenAI Lowers Bar for Cyber Threat Actors Episode 89: How Threat Actors Are Using GenAI as an Enabler DeepSeek: A New Player in the Global AI Race Multi-State Information Sharing and Analysis Center® If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 137: National Cybersecurity Through SLTT Resilience 42:00
42:00
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai42:00
In episode 137 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Terry Loftus , Assistant Superintendent (Chief Information Officer) of Integrated Technology Services at the San Diego County Office of Education (SDCOE); and Netta Squires , President of Government Affairs, Cybersecurity, & Resilience at Open District Solutions (ODS). Together, they discuss how the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) functions as a space for U.S. State, Local, Tribal, and Territorial (SLTT) entities to collectively strengthen their cyber resilience in support of U.S. national cybersecurity. Here are some highlights from our episode: 01:15 . A study to understand the cybersecurity perspectives of the MS-ISAC community 03:24 . The need for sustained cyber defense accelerators to drive U.S. SLTT resilience 07:31 . How surveys and focus groups uncovered U.S. SLTT cybersecurity funding, staffing, and governance challenges 13:06 . The superpower of cyber threat intelligence driven, tailored, and provided via community 17:41 . Trust as a foundation for building relationships among MS-ISAC members and partners 21:26 . How the MS-ISAC moved community cyber defense from conversational to operational 22:22 . The role of trust in making membership affordable and solutions at scale possible 25:00 . Opportunities for relationship building, training, and access to services in the MS-ISAC 30:00 . Examples of MS-ISAC success stories and the need to share them 33:40 . The MS-ISAC as a space to craft a strategic path for national cybersecurity 36:29 . Closing thoughts on how members value and can get involved in the MS-ISAC Resources Strengthening Critical Infrastructure: SLTT Progress & Priorities Malicious Domain Blocking and Reporting (MDBR) Episode 126: A Day in the Life of a CTI Analyst Why Whole-of-State Cybersecurity Is the Way Forward MS-ISAC: Defending America’s Critical Infrastructure If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 136: How WiCyS Advances Women in Cybersecurity 38:35
38:35
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai38:35
In episode 136 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined live by Lynn Dohm , Executive Director of Women in CyberSecurity (WiCyS). Together, they discuss how WiCyS works to advance women in cybersecurity. Here are some highlights from our episode: 01:03 . A mission of recruiting, retaining, and advancing women in cybersecurity 05:38 . How community-focused conferences and scholarships promote community growth 06:25 . The need to celebrate the work of and encourage support among cyber defenders 08:52 . Four strategic pillars as a foundation for navigating COVID, societal change, and more 13:50 . The importance of laying out cybersecurity career paths outside of individual companies 15:15 . How a foundation of inclusion enables diversity to expand 19:45 . The use of strategic partners to anticipate changing cybersecurity and hiring needs 22:38 . Inside the successes of the mentorships and other WiCyS programs 28:22 . The impact of Alan Paller on opening doors for WiCyS 32:35 . How volunteerism supports retention in cybersecurity through inclusion and satisfaction Resources Episode 77: Data's Value to Decision-Making in Cybersecurity Episode 120: How Contextual Awareness Drives AI Governance Alan Paller Laureate Program Episode 30: Solving Cybersecurity at Scale with Nonprofits If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 135: Five Lightning Chats at RSAC Conference 2025 23:30
23:30
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai23:30
In episode 135 of Cybersecurity Where You Are, Sean Atkinson is joined live at RSAC Conference 2025 by five attendees, including two Center for Internet Security® (CIS®) employees. He conducts a lightning chat with each attendee to get their thoughts about the conference, how it reflects the changing cybersecurity industry, and the role CIS plays in this ongoing evolution. Here are some highlights from our episode: 00:40 . Stephanie Gass , Sr. Director of Information Security at CIS How to start creating a policy and make it effective through implementation processes A transition to an approach integrating mappings for CIS security best practices The use of GenAI and security champions to make this transition 04:08 . Brad Bock , Director of Product Management at Chainguard Building and compiling security from the ground up in open-source container images Trusting pre-packaged software in an increasingly complex world Support of customer compliance with attestation, SBOMs, and vulnerability remediation 07:43 . Stephane Auger , Vice President Technologies and CISO at Équipe Microfix Customer awareness and other top challenges for MSPs and MSSPs The use of case studies and referrals to communicate the importance of cybersecurity A growing emphasis on cyber risk insurance as media attention around breaches grows 11:36 . Brent Holt , Director of Cybersecurity Technology at Edge Solutions LLC How the CIS Critical Security Controls facilitates a consultative approach to customers The importance of knowing where each company is in their use of GenAI Mapping elements of a portfolio to CIS security best practices 17:23 . Mishal Makshood , Sr. Cloud Security Account Executive at CIS The use of learning and research to investigate GenAI's utility for CIS An aspiration to scale efficiency and drive improvements with GenAI training A reminder to augment human thought, not replace it, with GenAI Resources Episode 63: Building Capability and Integration with SBOMs Mapping and Compliance Cybersecurity for MSPs, MSSPs, & Consultants Episode 130: The Story and Future of CIS Thought Leadership If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 134: How GenAI Lowers Bar for Cyber Threat Actors 39:48
39:48
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai39:48
In episode 134 of Cybersecurity Where You Are, Sean Atkinson is joined by Randy Rose, VP of Security Operations & Intelligence at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss how generative artificial intelligence (GenAI) lowers the barrier of entry for cyber threat actors (CTAs). Here are some highlights from our episode: 01:37 . CTAs' use of GenAI to improve their existing campaigns 03:38 . The need for CTI teams to look beyond language in analyzing GenAI-enabled threats 07:22 . The evolving impact of GenAI on phishing campaigns, malware development, deepfakes, and malicious Artificial Intelligence as a Service (AIaaS) offerings 12:28 . How GenAI increases the the speed at which CTAs can scale their efforts 17:29 . Technical barriers and other limitations that shape CTAs' use of GenAI 22:46 . A historical perspective of AI-enabled cybersecurity and how GenAI can support cybersecurity awareness training 26:50 . The cybersecurity benefits of AI and machine learning (ML) capabilities for clustering data 29:05 . What the future might hold for GenAI from an offensive and defensive perspective Resources The Evolving Role of Generative Artificial Intelligence in the Cyber Threat Landscape Episode 89: How Threat Actors Are Using GenAI as an Enabler Episode 95: AI Augmentation and Its Impact on Cyber Defense 12 CIS Experts' Cybersecurity Predictions for 2025 CIS Critical Security Controls® Multi-State Information Sharing and Analysis Center® If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 133: DieNet's DDoS Hacktivism and Evolving TTPs 32:33
32:33
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:33
In episode 133 of Cybersecurity Where You Are, Sean Atkinson is joined by Lauren McFayden, Threat Intelligence Analyst at the Center for Internet Security® (CIS®). Together, they discuss the Distributed Denial of Service (DDoS) hacktivism of DieNet and how the group continues to evolve its Tactics, Techniques, and Procedures (TTPs). Here are some highlights from our episode: 01:22 . An overview of DieNet and its emergence on Telegram 01:55 . DDoS attacks and the potential for service disruptions 02:55 . DieNet's pro-Palestinian ideology and opposition to the 47th U.S. Presidential Administration 05:00 . U.S. and foreign targets claimed by the group 06:30 . DieNet's history of claiming attacks against U.S. critical national infrastructure (CNI) 10:33 . Two pieces of evidence used to partially assess the credibility of a claimed attack 15:16 . How DieNet v2 suggests an escalation of attack strategies 20:43 . How the DDoS hacktivist group may continue to evolve its TTPs in subsequent versions 23:48 . The use of the CIS Critical Security Controls (CIS Controls) to reduce an attack surface 25:56 . How ThreatWA stands out in keeping you informed about emerging threats Resources Hacktivist Group DieNet Claims DDoS Attacks against U.S. CNI MS-ISAC Guide to DDoS Attacks ThreatWA CIS Critical Security Control 1: Inventory and Control of Enterprise Assets CIS Critical Security Control 2: Inventory and Control of Software Assets CIS Critical Security Control 3: Data Protection Episode 44: A Zero Trust Framework Knows No End If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 132: Day One, Step One, Dollar One for Cybersecurity 34:35
34:35
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai34:35
In episode 132 of Cybersecurity Where You Are, Sean Atkinson is joined by Valecia Stocchetti, Sr. Cybersecurity Engineer of the CIS Critical Security Controls (CIS Controls) at the Center for Internet Security® (CIS®). Together, they discuss what the first day, step, and dollar of implementing a controls framework look like for organizations stepping into their cybersecurity journey. Here are some highlights from our episode: 01:54 . Building and improving a cybersecurity program through the power of consensus 04:55 . The use of an assessment to determine where you are and where you're going 09:15 . How cross-mapping to multiple frameworks simplifies regulatory compliance efforts 12:00 . The use of governance to secure leadership buy-in for your cybersecurity program 13:33 . Continuous auditing and monitoring as tools for adapting to change 15:10 . How Controls prioritization flows through the Implementation Groups (IGs) 19:39 . Leadership as the backbone for getting any business program off the ground 22:59 . Calculating the cost of cyber defense as a preventative action 24:55 . Tradeoffs with security tools to keep in mind so that you can budget efficiently 30:00 . Qualifications when using security offerings of MSPs and CSPs Resources CIS Community Defense Model 2.0 How Risk Quantification Tests Your Reasonable Cyber Defense CIS Controls Self Assessment Tool (CIS CSAT) Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1 How to Plan a Cybersecurity Roadmap in 4 Steps The Cost of Cyber Defense: CIS Controls IG1 If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 131: It Takes a Village to 'Reasonably' Secure SoCal 32:52
32:52
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:52
In episode 131 of Cybersecurity Where You Are, Tony Sager is joined by Stan Stahl, PhD , Founder and President of SecureTheVillage . Together, they discuss how SecureTheVillage, a nonprofit and inaugural Alan Paller Laureate Program awardee , is using a collaboration-driven approach to enhance reasonable cybersecurity awareness and practices within Southern California (SoCal). Here are some highlights from our episode: 01:07 . An introduction to Stan and how he came to champion small business cybersecurity 04:28 . How SecureTheVillage emerged to support small businesses' cybersecurity needs using the power of community 07:15 . The need for nonprofits to play a strong role in addressing cybersecurity challenges 12:01 . How Stan drew inspiration from Alan Paller and support from the Alan Paller Laureate Program to advance SecureTheVillage's work 17:57 . Reasonable cybersecurity as part of SecureTheVillage's foundation story 22.13 . Aligning cybersecurity needs to the goals of public policy 25:33 . What's next for SecureTheVillage 29:52 . Closing thoughts on why a "village" model for cybersecurity is so important Resources Alan Paller Laureate Program Implementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1 Episode 30: Solving Cybersecurity at Scale with Nonprofits Reasonable Cybersecurity Guide If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 130: The Story and Future of CIS Thought Leadership 32:38
32:38
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:38
In episode 130 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by John Gilligan , President and Chief Executive Officer (CEO) of the Center for Internet Security® (CIS®). Set against the backdrop of the 2025 CIS Annual Full Staff Meeting, they celebrate 25 years of CIS, including the "serendipity" by which the company became a global cybersecurity thought leader. They also discuss how this thought leadership may evolve over the next 25 years. Here are some highlights from our episode: 01:30 . How CIS started along with how John and Tony initially got involved 07:12 . How CIS thought leadership changed with the absorption of the "SANS Top 20," the precursor of the CIS Critical Security Controls 11:04 . The "serendipity" through which CIS grew and formalized its sales, funding, support, and other operations in the 2010s 15:18 . How mission and culture advanced CIS to its 25th anniversary in 2025 22:52 . What the future might hold for "CIS 2.0" Resources 25 Years of Creating Confidence in the Connected World Episode 97: How Far We've Come preceding CIS's 25th Birthday Episode 114: 3 Board Chairs Reflect on 25 Years of Community Episode 76: The Role of Thought Leadership in Cybersecurity Episode 125: How Leadership Principles Influence CIS Culture Episode 120: How Contextual Awareness Drives AI Governance Episode 119: Multidimensional Threat Defense at Large Events If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 129: Embedding Cybersecurity in Project Management 32:18
32:18
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:18
In episode 129 of Cybersecurity Where You Are, Sean Atkinson discusses best practices for embedding cybersecurity in project management. Here are some highlights from our episode: 01:34 . Elements for connecting the dots between cybersecurity risk assessment and project risk assessment 03:06 . How our conceptualization of a project changes under a zero trust implementation 04:02 . What security may look like in a Waterfall vs. Agile approach to project management 06:26 . The importance of resources and stakeholders in managing any project 08:34 . Scope creep and other challenges of embedding cybersecurity in project management 15:45 . How continuous monitoring and other best practices can help us to overcome these hurdles 25:30 . How cybersecurity can inform projects involving generative artificial intelligence Resources Episode 105: Context in Cyber Risk Quantification Quantitative Risk Analysis: Its Importance and Implications How Risk Quantification Tests Your Reasonable Cyber Defense Episode 44: A Zero Trust Framework Knows No End How to Construct a Sustainable GRC Program in 8 Steps Episode 33: The Shift-Left of IoT Security to Vendors Episode 120: How Contextual Awareness Drives AI Governance If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 128: How Cryptocurrency Is Used for Financial Fraud 35:17
35:17
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai35:17
In episode 128 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf , Senior Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they examine how cyber threat actors use cryptocurrency for financial fraud and how professionals like Joshua track this illicit activity. Here are some highlights from our episode: 01:35 . What a data-driven approach to CTI looks like 02:47 . What makes cryptocurrency useful in the digital economy, including for financial fraud 06:50 . How cryptocurrency-related financial crime compares to traditional forms of fraud 13:20 . Examples of cryptocurrency theft and its use in facilitating ransomware attacks 27:24 . Tooling and forensic methods that are being used to track crypto fraud/scams 31:40 . The need to build awareness around financial crime in the digital economy Resources Episode 77: Data's Value to Decision-Making in Cybersecurity 2023 Cryptocurrency Fraud Report Released 2025 Crypto Crime Trends: Illicit Volumes Portend Record Year as On-Chain Crime Becomes Increasingly Diverse and Professionalized Suspected Lazarus subgroup behind DMM crypto heist Episode 126: A Day in the Life of a CTI Analyst Combatting Ransomware Episode 124: The Many Layers of a Malware Takedown Operation If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 127: Visible Ops as a Cybersecurity Foundation 37:45
37:45
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai37:45
In episode 127 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Scott Alldridge , President and CEO of IP Services and the IT Process Institute. Together, they use Scott's book, " Visible Ops Cybersecurity: Enhancing Your Cybersecurity Posture with Practical Guidance ," to discuss how visible IT operations (Visible Ops) provide a foundation for cybersecurity. Here are some highlights from our episode: 01:31 . How Visible Ops reflect an appreciation for the original config change release processes 10:19 . The limitations of treating security as a silo and "new toys" as security cure-alls 15:23 . How to embrace a dynamic view of visibility and configuration management 24:50 . The importance of leadership buy-in when shifting left to a security-first mindset 27:10 . What an effective change configuration management system looks like and how it changes people's view of IT 30:20 . Parting thoughts and where to find more of Scott's work Resources IT Process Institute What is ITIL? Your guide to the IT Infrastructure Library CIS Critical Security Controls (CIS Controls) Resources An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms Episode 44: A Zero Trust Framework Knows No End Why Employee Cybersecurity Awareness Training Is Important If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 126: A Day in the Life of a CTI Analyst 36:28
36:28
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai36:28
In episode 126 of Cybersecurity Where You Are, Sean Atkinson is joined by Casey Cannon, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they review what a regular day looks like for a CTI analyst. Here are some highlights from our episode: 01:46 . How a service-oriented mindset factors into a CTI career 03:55 . What task prioritization looks like at the beginning of a CTI analyst's day 06:50 . How bedrock CTI principles and threat actor matrices help to counter information overload and filter out noise 10:45 . The value of an "eclectic" set of intelligence sources 25:50 . How the CIS CTI team works with the 24x7x365 CIS Security Operations Center (SOC), the Cyber Incident Response Team (CIRT), and others 31:27 . Advice for getting into CTI as a career path Resources Episode 124: The Many Layers of a Malware Takedown Operation Episode 62: Inside the 'Spidey Sense' of a Pentester Combatting Ransomware The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 125: How Leadership Principles Influence CIS Culture 33:02
33:02
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai33:02
In episode 125 of Cybersecurity Where You Are, Sean Atkinson is joined by Waldo Perez , Human Resources Support Specialist at the Center for Internet Security® (CIS®); and Penny Davis , Sr. Manager of Leadership Development at CIS. Together, they use the CIS Leadership Principles and other examples from CIS to understand how leadership influences and nurtures the organization's workplace culture. Here are some highlights from our episode: 02:00 . The human aspect in defining workplace culture 03:55 . How leadership principles directly shape company culture 05:40 . Key indicators of a strong company culture and one that can improve 16:31 . Examples where company culture has made an impact on a CIS employee's experience 21:59 . The importance of feedback in supporting positive cultural change 25:41 . How leadership training programs help employees to grow Resources CIS Culture Episode 115: Continuous Feedback as CIS Employee Culture The Envelope, Please! The CIS 2024 President’s Award Goes to… Center for Internet Security Named Among 2024 Top Workplaces If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

1 Episode 124: The Many Layers of a Malware Takedown Operation 32:43
32:43
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:43
In episode 124 of Cybersecurity Where You Are, Sean Atkinson is joined by Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they explore the many layers of a malware takedown operation. Here are some highlights from our episode: 01:58 . A high-level overview of what a malware takedown might involve 04:11 . Some of the key players who help to disrupt known malware infrastructure 07:35 . Which operational functionalities make malware infrastructure and tactics difficult to dismantle 10:56 . Jurisdictional and legal challenges of a takedown operation 14:53 . What goes into identifying malware networks and infected end-user devices 20:47 . The technical strategies used for disrupting malware 24:13 . How cyber threat actors respond differently to a takedown effort Resources Phobos Ransomware Affiliates Arrested in Coordinated International Disruption Qakbot Malware Disrupted in International Cyber Takedown Episode 89: How Threat Actors Are Using GenAI as an Enabler Renew Your Ransomware Defense with CISA's Updated Guidance If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
Selamat datang di Player FM!
Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.