Rephonic
Artwork for Cybersecurity Where You Are

Cybersecurity Where You Are (video)

Center for Internet Security
Cybersecurity
Common Good Cyber
Center For Internet Security
Artificial Intelligence
Thought Leadership
Global Cyber Alliance
CIS Critical Security Controls
Zero Trust
Risk Management
CIS
Purple Teaming
Verizon Data Breach Investigations Report
Generative AI
Malware
Identity and Access Management
GDPR
Privacy Legislation
Data Security
Cybersecurity Frameworks
Compliance

Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore securit... more

PublishesWeeklyEpisodes173Founded5 years ago
Number of ListenersCategories
BusinessTechnologyNon-Profit

Listen to this Podcast

Artwork for Cybersecurity Where You Are

Latest Episodes

In episode 173 of Cybersecurity Where You Are, Sean Atkinson is joined by Roger Grimes, CISO Advisor at KnowBe4. Together, they discuss "scammer jousting," a term coined by Tony Sager which describes empowering organizations to manage human risk usin... more

In episode 172 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Chirag Arora, Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP. Together, they discuss how Chirag draws upon his experience as a CISO and... more

In episode 171 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Soledad Antelada Toledano, Security Advisor, Office of the CISO, Google Cloud at Google. Together, they discuss securing critical national infrastructure (CNI) ... more

In Episode 170 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager sit down with Douglas Holland, Senior Solutions Engineer at Akamai Technologies. Together, they discuss how U.S. State, Local, Tribal, and Territorial (SLTT) government organ... more

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Freakonomics Radio
Freakonomics RadioFreakonomics Radio + Stitcher
CISO Series Podcast
CISO Series PodcastDavid Spark, Mike Johnson, and Andy Ellis

Recent Guests

Douglas Holland
Solutions Engineer at Akamai focusing on public sector and SLTTs
Akamai
Episode: Episode 170: Visibility for SLTTs in Blocking Typhoon APTs
Tony Rutkowski
An experienced technology professional involved in cybersecurity and public policy.
Episode: Episode 168: Institutionalizing Good Cybersecurity Ideas
Dr. Kelley Misata
Chief Trailblazer and founder of Sightline Security
Sightline Security
Episode: Episode 167: Volunteers as a Critical Cybersecurity Resource
Tyler Moore
Professor at the University of Tulsa, researcher in security, economics, and cybercrime measurement.
University of Tulsa
Episode: Episode 166: Foundations of Actuarial Science in Cyber Risk
Curt Dukes
Executive Vice President of Security Best Practices at CIS
Center for Internet Security
Episode: Episode 164: Secure by Design in Software Development
Steve Lipner
Executive Director of SafeCode, an industry nonprofit focusing on software security practices
SafeCode
Episode: Episode 164: Secure by Design in Software Development
Brock Boggs
K-12 IT professional with extensive experience in cybersecurity
Cityscape Schools
Episode: Episode 163: K-12 Cybersecurity Made Practical
Maureen Kunac
Works with CIS on SecureSuite tools and member engagement
Center for Internet Security
Episode: Episode 163: K-12 Cybersecurity Made Practical
Tina Williams-Koroma
A seasoned cybersecurity professional with over 22 years of experience in the tech field, previously a software developer at Lockheed Martin, now an entrepreneur and founder of CyDeploy.
Founder of CyDeploy
Episode: Episode 162: A Managed Approach to a Managed Attack Surface

Hosts

Sean Atkinson
CISO at the Center for Internet Security
Tony Sager
Senior Vice President and Chief Evangelist at the Center for Internet Security

Reviews

4.9 out of 5 stars from 33 ratings
  • exceptional

    awesome

    Apple Podcasts
    5
    JVo12
    Canada3 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Many have praised the relevance of topics discussed, recognizing their importance in contemporary cybersecurity challenges.
Listeners appreciate the clarity and accessibility of the information presented, seeing it as both educational and engaging.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#199
Singapore/Technology

Talking Points

Recent interactions between the hosts and their guests.

Episode 172: Helping CISOs as a CIS Controls Ambassador
Q: How does your thought process work when building your innovation pipeline?
Chirag emphasizes that understanding the impact of innovations is crucial. He aims to address challenges faced by CISOs by sharing lessons learned from his experiences, enabling others to succeed without making the same mistakes.
Episode 170: Visibility for SLTTs in Blocking Typhoon APTs
Q: What are starting to see in the evolution of TTPs from the typhoon type APTs?
They have shifted more to leveraging built-in tools to blend in, making it harder for defenses to detect unusual activity.
Episode 163: K-12 Cybersecurity Made Practical
Q: What would you recommend to other K through 12 administrators who have been given the same assignment you were many years ago?
I would highly recommend getting registered as a K-12 organization with CIS to see what tools might be helpful.
Episode 162: A Managed Approach to a Managed Attack Surface
Q: What would you say to small and medium businesses feeling overwhelmed by cybersecurity?
Focus on what can you not afford to happen to your systems or your data, which would put you out of business.
Episode 161: An Ecosystem-Wide Approach to CNI Resilience
Q: How do CIS Hardened Images help in compliance with frameworks like NIST or ISO?
CIS Hardened Images provide a shortcut to compliance, allowing organizations to easily map their security posture to popular frameworks while reducing friction in governance.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Cybersecurity Where You Are

What is Cybersecurity Where You Are about and what kind of topics does it cover?

Focused on the ever-evolving realm of cybersecurity, discussions frequently orbit around practical strategies and best practices for individuals and organizations in various sectors, including education, government, and business. Topics often highlight the importance of proactive measures, like secure software development and the implementation of critical security controls, together with insights on managing threats such as malware and phishing. Unique perspectives are provided through expert interviews and real-world experiences, making the complex landscape of cybersecurity more accessible and relatable to all audiences. The content is aimed at fostering understanding and improving cybersecurity posture across different communities, advo... more

Where can I find podcast stats for Cybersecurity Where You Are?

Rephonic provides a wide range of podcast stats for Cybersecurity Where You Are. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Cybersecurity Where You Are and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Cybersecurity Where You Are get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Cybersecurity Where You Are, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Cybersecurity Where You Are?

Rephonic provides comprehensive predictive audience data for Cybersecurity Where You Are, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Cybersecurity Where You Are have?

To see how many followers or subscribers Cybersecurity Where You Are has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Cybersecurity Where You Are?

These podcasts share a similar audience with Cybersecurity Where You Are:

1. Cybersecurity Today
2. Cybersecurity Headlines
3. Freakonomics Radio
4. CISO Series Podcast
5. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

How many episodes of Cybersecurity Where You Are are there?

Cybersecurity Where You Are launched 5 years ago and published 173 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Cybersecurity Where You Are?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Cybersecurity Where You Are?

Rephonic pulls ratings and reviews for Cybersecurity Where You Are from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Cybersecurity Where You Are?

Rephonic provides full transcripts for episodes of Cybersecurity Where You Are. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Cybersecurity Where You Are?

Recent guests on Cybersecurity Where You Are include:

1. Douglas Holland
2. Tony Rutkowski
3. Dr. Kelley Misata
4. Tyler Moore
5. Curt Dukes
6. Steve Lipner
7. Brock Boggs
8. Maureen Kunac

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days