Player FM - Internet Radio Done Right
Checked 19h ago
Vor drei Jahren hinzugefügt
Inhalt bereitgestellt von David Bisson and Center for Internet Security. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von David Bisson and Center for Internet Security oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!
Gehen Sie mit der App Player FM offline!
Cybersecurity Where You Are (video)
Alle als (un)gespielt markieren ...
Manage series 3382533
Inhalt bereitgestellt von David Bisson and Center for Internet Security. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von David Bisson and Center for Internet Security oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the audio version of our podcast here: https://fast.wistia.net/embed/channel/wbyhaw35xf?wchannelid=wbyhaw35xf.
…
continue reading
128 Episoden
Alle als (un)gespielt markieren ...
Manage series 3382533
Inhalt bereitgestellt von David Bisson and Center for Internet Security. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von David Bisson and Center for Internet Security oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, creating confidence in the connected world. Subscribe to the audio version of our podcast here: https://fast.wistia.net/embed/channel/wbyhaw35xf?wchannelid=wbyhaw35xf.
…
continue reading
128 Episoden
Alle Folgen
×C
Cybersecurity Where You Are (video)

In episode 128 of Cybersecurity Where You Are, Sean Atkinson is joined by Joshua Palsgraf , Senior Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they examine how cyber threat actors use cryptocurrency for financial fraud and how professionals like Joshua track this illicit activity. Here are some highlights from our episode: 01:35 . What a data-driven approach to CTI looks like 02:47 . What makes cryptocurrency useful in the digital economy, including for financial fraud 06:50 . How cryptocurrency-related financial crime compares to traditional forms of fraud 13:20 . Examples of cryptocurrency theft and its use in facilitating ransomware attacks 27:24 . Tooling and forensic methods that are being used to track crypto fraud/scams 31:40 . The need to build awareness around financial crime in the digital economy Resources Episode 77: Data's Value to Decision-Making in Cybersecurity 2023 Cryptocurrency Fraud Report Released 2025 Crypto Crime Trends: Illicit Volumes Portend Record Year as On-Chain Crime Becomes Increasingly Diverse and Professionalized Suspected Lazarus subgroup behind DMM crypto heist Episode 126: A Day in the Life of a CTI Analyst Combatting Ransomware Episode 124: The Many Layers of a Malware Takedown Operation If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
In episode 127 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Scott Alldridge , President and CEO of IP Services and the IT Process Institute. Together, they use Scott's book, " Visible Ops Cybersecurity: Enhancing Your Cybersecurity Posture with Practical Guidance ," to discuss how visible IT operations (Visible Ops) provide a foundation for cybersecurity. Here are some highlights from our episode: 01:31 . How Visible Ops reflect an appreciation for the original config change release processes 10:19 . The limitations of treating security as a silo and "new toys" as security cure-alls 15:23 . How to embrace a dynamic view of visibility and configuration management 24:50 . The importance of leadership buy-in when shifting left to a security-first mindset 27:10 . What an effective change configuration management system looks like and how it changes people's view of IT 30:20 . Parting thoughts and where to find more of Scott's work Resources IT Process Institute What is ITIL? Your guide to the IT Infrastructure Library CIS Critical Security Controls (CIS Controls) Resources An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms Episode 44: A Zero Trust Framework Knows No End Why Employee Cybersecurity Awareness Training Is Important If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
In episode 126 of Cybersecurity Where You Are, Sean Atkinson is joined by Casey Cannon, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they review what a regular day looks like for a CTI analyst. Here are some highlights from our episode: 01:46 . How a service-oriented mindset factors into a CTI career 03:55 . What task prioritization looks like at the beginning of a CTI analyst's day 06:50 . How bedrock CTI principles and threat actor matrices help to counter information overload and filter out noise 10:45 . The value of an "eclectic" set of intelligence sources 25:50 . How the CIS CTI team works with the 24x7x365 CIS Security Operations Center (SOC), the Cyber Incident Response Team (CIRT), and others 31:27 . Advice for getting into CTI as a career path Resources Episode 124: The Many Layers of a Malware Takedown Operation Episode 62: Inside the 'Spidey Sense' of a Pentester Combatting Ransomware The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber Maturity If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 125 of Cybersecurity Where You Are, Sean Atkinson is joined by Waldo Perez , Human Resources Support Specialist at the Center for Internet Security® (CIS®); and Penny Davis , Sr. Manager of Leadership Development at CIS. Together, they use the CIS Leadership Principles and other examples from CIS to understand how leadership influences and nurtures the organization's workplace culture. Here are some highlights from our episode: 02:00 . The human aspect in defining workplace culture 03:55 . How leadership principles directly shape company culture 05:40 . Key indicators of a strong company culture and one that can improve 16:31 . Examples where company culture has made an impact on a CIS employee's experience 21:59 . The importance of feedback in supporting positive cultural change 25:41 . How leadership training programs help employees to grow Resources CIS Culture Episode 115: Continuous Feedback as CIS Employee Culture The Envelope, Please! The CIS 2024 President’s Award Goes to… Center for Internet Security Named Among 2024 Top Workplaces If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 124 of Cybersecurity Where You Are, Sean Atkinson is joined by Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at the Center for Internet Security® (CIS®). Together, they explore the many layers of a malware takedown operation. Here are some highlights from our episode: 01:58 . A high-level overview of what a malware takedown might involve 04:11 . Some of the key players who help to disrupt known malware infrastructure 07:35 . Which operational functionalities make malware infrastructure and tactics difficult to dismantle 10:56 . Jurisdictional and legal challenges of a takedown operation 14:53 . What goes into identifying malware networks and infected end-user devices 20:47 . The technical strategies used for disrupting malware 24:13 . How cyber threat actors respond differently to a takedown effort Resources Phobos Ransomware Affiliates Arrested in Coordinated International Disruption Qakbot Malware Disrupted in International Cyber Takedown Episode 89: How Threat Actors Are Using GenAI as an Enabler Renew Your Ransomware Defense with CISA's Updated Guidance If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 123 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Gina Chapman , Chief Operating Officer (COO) at the Center for Internet Security® (CIS®). Together, they use examples from CIS to identify elements of an operational playbook for making an impact in the cybersecurity industry. Here are some highlights from our episode: 01:21 . Business development and organizational change over the course of 12 years at CIS 13:49 . Change management and communication as means for preserving company culture 23:08 . The importance of context in developing an operational playbook for a business 32:49 . The use of operational understanding to create effective cybersecurity business models Resources Gina Chapman CIS Culture CIS Leadership Principles Episode 82: How CIS Leadership Values Team Building Events Cybersecurity at Scale: Piercing the Fog of More Combatting Ransomware Episode 68: Designing Cyber Defense as a Partnership Effort If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 122 of Cybersecurity Where You Are, Sean Atkinson is joined by Rian Davis , Associate Hybrid Threat Intelligence Analyst at the Center for Internet Security® (CIS®); and Timothy Davis, Lead Cyber Threat Intelligence (CTI) Analyst at CIS. Together, they discuss security and utility considerations surrounding the DeepSeek AI model. Here are some highlights from our episode: 01:31 . What enterprises and individuals can do before they start deploying foreign-developed, open-source large language models (LLMs) 08:48 . How DeepSeek fits into evolving adversarial tactics and techniques involving AI 25:15 . The impact on threat assessments and where we see controls built around AI 31:45 . Parting thoughts on approaching newer technologies like DeepSeek Resources DeepSeek hit by cyberattack as users flock to Chinese AI startup A 9th telecoms firm has been hit by a massive Chinese espionage campaign, the White House says TikTok: Influence Ops, Data Practices Threaten U.S. Security Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History Episode 89: How Threat Actors Are Using GenAI as an Enabler ODNI Releases 2024 Annual Threat Assessment of the U.S. Intelligence Community The Strava Heat Map and the End of Secrets Man who exploded Cybertruck in Las Vegas used ChatGPT in planning, police say Episode 120: How Contextual Awareness Drives AI Governance If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 121 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Tyler Moore, Ph.D. , Chair of Cyber Studies at the University of Tulsa. Together, they discuss the role of economics in cyber risk quantification and cybersecurity decision-making. Here are some highlights from our episode: 01:55 . How incentives, market failures, and other economic principles intersect with cybersecurity 08:39 . A model of translating shared information as a way to capture complexity in cybersecurity decision-making 13:20 . Pressing issues when making decisions about cybersecurity 18:08 . How to have enough confidence and a cyber risk quantification model that's useful 23:45 . How rigorous recommendations can help to match modeling and techniques like minimization 29:23 . The role of the Board in making cybersecurity decisions and how to speak its language 34:57 . Parting thoughts about risk quantification in cybersecurity Resources Episode 105: Context in Cyber Risk Quantification 2024 DBIR Findings & How the CIS Critical Security Controls Can Help to Mitigate Risk to Your Organization CIS Community Defense Model 2.0 FAIR: A Framework for Revolutionizing Your Risk Analysis Society of Information Risk Analysts If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 120 of Cybersecurity Where You Are, Sean Atkinson explores how contextual awareness of generative artificial intelligence (GenAI) deployment in the business creates a foundation for AI governance strategy. Here are some highlights from our episode: 01:58 . Why specificity is important when we use the term "AI" in the governance space 04:10 . Two AI distributions and how contextual function varies between them 13:52 . The importance of engagement and asking the right questions 18:28 . The role of lifecycle approaches and risk tolerance in understanding AI integration 23:45 . Navigating two common questions that arise when governing AI Resources Episode 116: AI-Enhanced Ransomware and Defending Against It EU AI Act: first regulation on artificial intelligence AI Risk Management Framework IAPP AI Governance Center How to Construct a Sustainable GRC Program in 8 Steps If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 119 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen , Executive Director of Countering Hybrid Threats at the Center for Internet Security® (CIS®). Together, they discuss the importance and provide examples of multidimensional threat defense as a means of securing large events. Here are some highlights from our episode: 01:42 . An overview of the multidimensional threat landscape from 2024 going into 2025 07:00 . The shift to multidimensional threat analysis in crisis management 10:52 . The importance of a sustainable, actionable approach to addressing today's threats 16:10 . How CIS is working to help organizations build safety against multidimensional threats, including at large events Resources 2024 Election Threat Landscape Election Security Spotlight — Prep for Election Disruptions Episode 93: Building Public Resilience in a Connected World ThreatWA™ Countering Multidimensional Threats: Lessons Learned from the 2024 Election If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
In episode 118 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Smith , Security Architect for BP and Instructor at the SANS Institute. Together, they review the state of post-quantum cryptography as well as share recommendations for how organizations and individuals can prepare to move into the post-quantum era. Here are some highlights from our episode: 02:55 . What post-quantum cryptography is and why we need to pay attention 04:11 . The impact of a cryptographically relevant quantum computer on symmetric vs. asymmetric cryptography 08:58 . How media attention contributes to preparedness from an infrastructure perspective 14:30 . The importance of a cryptography bill of materials (CBOM) 21:58 . How organizations can prepare against quantum-enabled cyber attacks 29:05 . How individuals need to understand quantum infrastructure in order to protect it 32:24 . Optimism for the future of post-quantum cryptography Resources Episode 48: 3 Trends to Watch in the Cybersecurity Industry Post Quantum Cryptography by Attack Detect Defend (rot169) NIST Releases First 3 Finalized Post-Quantum Encryption Standards Episode 75: How GenAI Continues to Reshape Cybersecurity Internet of Things: Embedded Security Guidance If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 117 of Cybersecurity Where You Are, Sean Atkinson reflects on the 2025 cybersecurity predictions of 12 experts at the Center for Internet Security® (CIS®), as shared on the CIS website . Here are some highlights from our episode: 01:40 . Artificial intelligence (AI) as a means for crafting higher quality phishing emails 04:24 . Zero trust with identity as a catalyst in 2025 07:55 . A governance focus for K-12 school districts 12:37 . Secure by design as part of the DNA of IT departments 14:22 . The need for continuous patching with Internet of Things (IoT) devices 15:27 . Training and adherence to basic cybersecurity practices as ongoing emphases 17:15 . Consolidation from an operations perspective 20:40 . The integration of AI into business operations 24:07 . The socio-political impacts of emerging technologies on multidimensional threats 26:46 . Growing attention on cloud security and data location 29:13 . Cybercriminal markets and Phishing as a Service models 32:16 . The benefit of AI to organizations Resources Episode 75: How GenAI Continues to Reshape Cybersecurity An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms How to Deter Multidimensional Threats in the Connected World Episode 116: AI-Enhanced Ransomware and Defending Against It Episode 44: A Zero Trust Framework Knows No End Episode 107: Continuous Improvement via Secure by Design Episode 76: The Role of Thought Leadership in Cybersecurity Episode 63: Building Capability and Integration with SBOMs Episode 95: AI Augmentation and Its Impact on Cyber Defense Why Employee Cybersecurity Awareness Training Is Important Episode 110: How Security Culture and Corporate Culture Mesh Episode 99: How Cyber-Informed Engineering Builds Resilience Episode 87: Marking 11 Years as a Verizon DBIR Contributor If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 116 of Cybersecurity Where You Are, Sean Atkinson discusses the threat of AI-enhanced ransomware along with the use of generative artificial intelligence (GenAI) to defend against it. Here are some highlights from our episode: 02:10 . How AI in the cybersecurity space has advanced over the past few years 05:12 . Why cybercriminals are incorporating artificial intelligence into their attacks 19:24 . The application of AI in various stages of a ransomware attack 26:10 . How AI can inform different aspects of a ransomware defense strategy Resources Episode 89: How Threat Actors Are Using GenAI as an Enabler Episode 95: AI Augmentation and Its Impact on Cyber Defense Episode 44: A Zero Trust Framework Knows No End The State of Ransomware 2024 Ransomware: The Data Exfiltration and Double Extortion Trends Episode 113: Cyber Risk Prioritization as Ransomware Defense Security Chaos Engineering: Sustaining Resilience in Software and Systems If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 115 of Cybersecurity Where You Are, Sean Atkinson is joined by Carolyn Comer , Chief Human Resources Officer at the Center for Internet Security® (CIS®); Heidi Gonzalez , Sr. Employee Experience Specialist at CIS; and Jennifer Myers, Sr. Director of Learning and Development at CIS. With an in-person holiday open house and office party as their backdrop, they celebrate the continuous feedback that sustains and grows the employee culture at CIS. Here are some highlights from our episode: 02:35 . How the holiday open house and office party celebrate CIS employee culture 04:11 . How the workforce culture at CIS has changed over time 07:57 . What types of employee feedback CIS obtains after in-person events 09:33 . How in-person interactions guide a continuous learning program for CIS employees 10:55 . How events such as the holiday open house and office party continue to evolve 16:48 . Why CIS has been so successful in helping employees to navigate remote work 20:04 . The impact of an engaged Board of Directors on workplace culture 21:40 . Celebrations and upcoming plans for culture and learning at CIS Resources Episode 83: Why Meeting in Person Matters to CIS Employees Episode 58: Inside CIS's Award-Winning Workplace Culture Center for Internet Security Named Among 2024 Best Companies to Work for in New York Center for Internet Security Named Among 2024 Top Workplaces IDEA Alliance CIS Cares Episode 114: 3 Board Chairs Reflect on 25 Years of Community If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
C
Cybersecurity Where You Are (video)

In episode 114 of Cybersecurity Where You Are, Tony Sager is joined by three past and current Board Chairs of the Center for Internet Security® (CIS®): Frank Reeder , CIS Director Emeritus and Founding Chair as well as Director of the National Cybersecurity Scholarship Foundation; John Gilligan , President and Chief Executive Officer of CIS; and Bobbie Stempfley , CIS Board Chair and Business Security Officer of the Infrastructure Solutions Group at Dell Technologies. Together, they reflect on 25 years of CIS building community in the cybersecurity space. Here are some highlights from our episode: 07:04 . Perception of the problem that led to the idea of CIS 10:18 . The value of building community outside of government 17:31 . A sustainable and powerful business model for CIS 21:28 . John's priorities during his transition from Board Chair to CEO 34:38 . What CIS will focus on next 39:00 . Parting thoughts for the future Resources Episode 35: Remembering the Late Alan Paller Episode 97: How Far We've Come preceding CIS's 25th Birthday Episode 79: Advancing Common Good in Cybersecurity – Part 1 Episode 76: The Role of Thought Leadership in Cybersecurity Episode 58: Inside CIS's Award-Winning Workplace Culture If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org .…
Willkommen auf Player FM!
Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.