Rephonic
Artwork for Cybersecurity Where You Are

Cybersecurity Where You Are (video)

Center for Internet Security
Cybersecurity
Common Good Cyber
Center For Internet Security
Artificial Intelligence
Thought Leadership
Global Cyber Alliance
CIS Critical Security Controls
Risk Management
Zero Trust
CIS
Purple Teaming
Verizon Data Breach Investigations Report
Generative AI
Malware
Identity and Access Management
GDPR
Data Security
Privacy Legislation
Cybersecurity Frameworks
Compliance

Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore securit... more

PublishesWeeklyEpisodes169Founded5 years ago
Number of ListenersCategories
Non-ProfitBusinessTechnology

Listen to this Podcast

Artwork for Cybersecurity Where You Are

Latest Episodes

In Episode 169 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager begin their discussion of 2026 cybersecurity predictions from seven experts at the Center for Internet Security® (CIS®), as shared on the CIS website.

Here are some highligh... more

In Episode 168 of Cybersecurity Where You Are, Tony Sager sits down with Tony Rutkowski, one of the CIS Critical Security Controls® (CIS Controls®) Ambassadors of the Center for Internet Security® (CIS®). Together, they discuss what Tony Rutkowski ha... more

In Episode 167 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Kelley Misata, Ph.D., Chief Trailblazer and Founder at Sightline Security. Together, they discuss how volunteers constitute a critical cybersecurity resource fo... more

In Episode 166 of Cybersecurity Where You Are, Sean Atkinson sits down with Tyler Moore, Ph.D., Chair of Cyber Studies at the University of Tulsa, and Daniel Woods, Lecturer at the University of Edinburgh. Together, they review the foundations of act... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Tony Rutkowski
An experienced technology professional involved in cybersecurity and public policy.
Episode: Episode 168: Institutionalizing Good Cybersecurity Ideas
Dr. Kelley Misata
Chief Trailblazer and founder of Sightline Security
Sightline Security
Episode: Episode 167: Volunteers as a Critical Cybersecurity Resource
Tyler Moore
Professor at the University of Tulsa, researcher in security, economics, and cybercrime measurement.
University of Tulsa
Episode: Episode 166: Foundations of Actuarial Science in Cyber Risk
Curt Dukes
Executive Vice President of Security Best Practices at CIS
Center for Internet Security
Episode: Episode 164: Secure by Design in Software Development
Steve Lipner
Executive Director of SafeCode, an industry nonprofit focusing on software security practices
SafeCode
Episode: Episode 164: Secure by Design in Software Development
Brock Boggs
K-12 IT professional with extensive experience in cybersecurity
Cityscape Schools
Episode: Episode 163: K-12 Cybersecurity Made Practical
Maureen Kunac
Works with CIS on SecureSuite tools and member engagement
Center for Internet Security
Episode: Episode 163: K-12 Cybersecurity Made Practical
Tina Williams-Koroma
A seasoned cybersecurity professional with over 22 years of experience in the tech field, previously a software developer at Lockheed Martin, now an entrepreneur and founder of CyDeploy.
Founder of CyDeploy
Episode: Episode 162: A Managed Approach to a Managed Attack Surface
Mishal Makshood
Partner Alliance Manager for Azure at CIS
Center for Internet Security
Episode: Episode 161: An Ecosystem-Wide Approach to CNI Resilience

Hosts

Sean Atkinson
CISO at the Center for Internet Security
Tony Sager
Senior Vice President and Chief Evangelist at the Center for Internet Security

Reviews

4.9 out of 5 stars from 33 ratings
  • exceptional

    awesome

    Apple Podcasts
    5
    JVo12
    Canada3 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Many have praised the relevance of topics discussed, recognizing their importance in contemporary cybersecurity challenges.
Listeners appreciate the clarity and accessibility of the information presented, seeing it as both educational and engaging.

Top Technology Podcasts

Acquired
AcquiredBen Gilbert and David Rosenthal
Hard Fork
Hard ForkThe New York Times
Better Offline
Better OfflineCool Zone Media and iHeartPodcasts
Building AI Boston
Building AI BostonBuilding AI Boston

Talking Points

Recent interactions between the hosts and their guests.

Episode 163: K-12 Cybersecurity Made Practical
Q: What would you recommend to other K through 12 administrators who have been given the same assignment you were many years ago?
I would highly recommend getting registered as a K-12 organization with CIS to see what tools might be helpful.
Episode 162: A Managed Approach to a Managed Attack Surface
Q: What would you say to small and medium businesses feeling overwhelmed by cybersecurity?
Focus on what can you not afford to happen to your systems or your data, which would put you out of business.
Episode 161: An Ecosystem-Wide Approach to CNI Resilience
Q: How do CIS Hardened Images help in compliance with frameworks like NIST or ISO?
CIS Hardened Images provide a shortcut to compliance, allowing organizations to easily map their security posture to popular frameworks while reducing friction in governance.
Episode 161: An Ecosystem-Wide Approach to CNI Resilience
Q: What are CIS Hardened Images and why are they important for secure cloud infrastructure?
CIS Hardened Images are pre-configured virtual machine templates engineered according to CIS globally recognized benchmarks, which minimize exposure and ensure a secure baseline for cloud infrastructure.
Episode 155: The Story of CIS 2.0 and Adapting to a New Era
Q: But what was your thinking of the time there? What was the role that you saw for a nonprofit and the focus being security benchmarks?
John Gilligan reflects on his connection to the Center for Internet Security and the role of a nonprofit in addressing cybersecurity challenges, emphasizing the importance of securing configurations to prevent breaches.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Cybersecurity Where You Are

What is Cybersecurity Where You Are about and what kind of topics does it cover?

Focused on the ever-evolving realm of cybersecurity, discussions frequently orbit around practical strategies and best practices for individuals and organizations in various sectors, including education, government, and business. Topics often highlight the importance of proactive measures, like secure software development and the implementation of critical security controls, together with insights on managing threats such as malware and phishing. Unique perspectives are provided through expert interviews and real-world experiences, making the complex landscape of cybersecurity more accessible and relatable to all audiences. The content is aimed at fostering understanding and improving cybersecurity posture across different communities, advo... more

Where can I find podcast stats for Cybersecurity Where You Are?

Rephonic provides a wide range of podcast stats for Cybersecurity Where You Are. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Cybersecurity Where You Are and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Cybersecurity Where You Are get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Cybersecurity Where You Are, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Cybersecurity Where You Are?

Rephonic provides comprehensive predictive audience data for Cybersecurity Where You Are, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Cybersecurity Where You Are have?

To see how many followers or subscribers Cybersecurity Where You Are has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Cybersecurity Where You Are?

These podcasts share a similar audience with Cybersecurity Where You Are:

1. Cybersecurity Headlines
2. Cybersecurity Today
3. Darknet Diaries
4. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
5. CISO Series Podcast

How many episodes of Cybersecurity Where You Are are there?

Cybersecurity Where You Are launched 5 years ago and published 169 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Cybersecurity Where You Are?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Cybersecurity Where You Are?

Rephonic pulls ratings and reviews for Cybersecurity Where You Are from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Cybersecurity Where You Are?

Rephonic provides full transcripts for episodes of Cybersecurity Where You Are. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Cybersecurity Where You Are?

Recent guests on Cybersecurity Where You Are include:

1. Tony Rutkowski
2. Dr. Kelley Misata
3. Tyler Moore
4. Curt Dukes
5. Steve Lipner
6. Brock Boggs
7. Maureen Kunac
8. Tina Williams-Koroma

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days