Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Episode 165: An In-Depth Look at CIS Controls Implementation
|
Dec 10, 2025 |
|
Episode 164: Secure by Design in Software Development
|
Dec 03, 2025 |
|
Episode 163: K-12 Cybersecurity Made Practical
|
Nov 26, 2025 |
|
Episode 162: A Managed Approach to a Managed Attack Surface
|
Nov 19, 2025 |
|
Episode 161: An Ecosystem-Wide Approach to CNI Resilience
|
Nov 12, 2025 |
|
Episode 160: Championing SME Security with the CIS Controls
|
Nov 05, 2025 |
|
Episode 159: The Scariest Malware of 2025
|
Oct 29, 2025 |
|
Episode 158: Scaling CMMC Compliance with Nerdio
|
Oct 22, 2025 |
|
Episode 157: How a Modern, Mission-Driven CIRT Operates
|
Oct 15, 2025 |
|
Episode 156: How CIS Uses CIS Products and Services
|
Oct 08, 2025 |
|
Episode 155: The Story of CIS 2.0 and Adapting to a New Era
|
Oct 01, 2025 |
|
Episode 154: Integration of Incident Response into DevSecOps
|
Sep 24, 2025 |
|
Episode 153: Advice for Newcomers to IT and Cybersecurity
|
Sep 17, 2025 |
|
Episode 152: Driving Response Time While Enriching Telemetry
|
Sep 10, 2025 |
|
Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2
|
Sep 03, 2025 |
|
Episode 150: A Roundtable Chat to Celebrate 150 Episodes
|
Aug 27, 2025 |
|
Episode 149: Human Error, AI Missteps, and Other VM Risks
|
Aug 20, 2025 |
|
Episode 148: How MDR Helps Shine a Light on Zero-Day Attacks
|
Aug 13, 2025 |
|
Episode 147: Actualizing Threat Intel for Effective Defense
|
Aug 06, 2025 |
|
Episode 146: What Security Looks Like for a Security Company
|
Jul 30, 2025 |
|
Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1
|
Jul 23, 2025 |
|
Episode 144: Carrying on the MS-ISAC's Character and Culture
|
Jul 16, 2025 |
|
Episode 143: Iran's Growing Multidimensional Threat Activity
|
Jul 09, 2025 |
|
Episode 142: SLTTs and Their Nuanced Cybersecurity Needs
|
Jul 02, 2025 |
|
Episode 141: A Human-Centered Take on Password Policies
|
Jun 25, 2025 |
|
Episode 140: Threat-Informed Travel Safety Tips
|
Jun 18, 2025 |
|
Episode 139: Community Building for the Cyber-Underserved
|
Jun 11, 2025 |
|
Episode 138: The Use of GenAI to Refine Your TTX Development
|
Jun 04, 2025 |
|
Episode 137: National Cybersecurity Through SLTT Resilience
|
May 28, 2025 |
|
Episode 136: How WiCyS Advances Women in Cybersecurity
|
May 21, 2025 |
|
Episode 135: Five Lightning Chats at RSAC Conference 2025
|
May 14, 2025 |
|
Episode 134: How GenAI Lowers Bar for Cyber Threat Actors
|
May 07, 2025 |
|
Episode 133: DieNet's DDoS Hacktivism and Evolving TTPs
|
Apr 30, 2025 |
|
Episode 132: Day One, Step One, Dollar One for Cybersecurity
|
Apr 23, 2025 |
|
Episode 131: It Takes a Village to 'Reasonably' Secure SoCal
|
Apr 16, 2025 |
|
Episode 130: The Story and Future of CIS Thought Leadership
|
Apr 09, 2025 |
|
Episode 129: Embedding Cybersecurity in Project Management
|
Apr 02, 2025 |
|
Episode 128: How Cryptocurrency Is Used for Financial Fraud
|
Mar 26, 2025 |
|
Episode 127: Visible Ops as a Cybersecurity Foundation
|
Mar 19, 2025 |
|
Episode 126: A Day in the Life of a CTI Analyst
|
Mar 12, 2025 |
|
Episode 125: How Leadership Principles Influence CIS Culture
|
Mar 05, 2025 |
|
Episode 124: The Many Layers of a Malware Takedown Operation
|
Feb 26, 2025 |
|
Episode 123: An Operational Playbook for Security Impact
|
Feb 19, 2025 |
|
Episode 122: DeepSeek AI Security and Utility Considerations
|
Feb 12, 2025 |
|
Episode 121: The Economics of Cybersecurity Decision-Making
|
Feb 05, 2025 |
|
Episode 120: How Contextual Awareness Drives AI Governance
|
Jan 29, 2025 |
|
Episode 119: Multidimensional Threat Defense at Large Events
|
Jan 22, 2025 |
|
Episode 118: Preparing for Post-Quantum Cryptography
|
Jan 15, 2025 |
|
Episode 117: 2025 Cybersecurity Predictions from CIS Experts
|
Jan 08, 2025 |
|
Episode 116: AI-Enhanced Ransomware and Defending Against It
|
Jan 01, 2025 |
|
Episode 115: Continuous Feedback as CIS Employee Culture
|
Dec 25, 2024 |
|
Episode 114: 3 Board Chairs Reflect on 25 Years of Community
|
Dec 18, 2024 |
|
Episode 113: Cyber Risk Prioritization as Ransomware Defense
|
Dec 11, 2024 |
|
Episode 112: How SANS Fosters Action on Cybersecurity Trends
|
Dec 04, 2024 |
|
Episode 111: Distilling a First Principle of Cybersecurity
|
Nov 27, 2024 |
|
Episode 110: How Security Culture and Corporate Culture Mesh
|
Nov 20, 2024 |
|
Episode 109: The Scariest Malware of 2024
|
Nov 13, 2024 |
|
Episode 108: Gaming and Competition in Cybersecurity
|
Nov 06, 2024 |
|
Episode 107: Continuous Improvement via Secure by Design
|
Oct 30, 2024 |
|
Episode 106: How to Avoid Falling for a Donation Scam
|
Oct 23, 2024 |
|
Episode 105: Context in Cyber Risk Quantification
|
Oct 16, 2024 |
|
Episode 104: Inside the First Year of a Cybersecurity Career
|
Oct 09, 2024 |
|
Episode 103: Education vs. Experience in Cybersecurity
|
Oct 02, 2024 |
|
Episode 102: The Sporty Rigor of CIS Controls Accreditation
|
Sep 25, 2024 |
|
Episode 101: Visualizing Attack Paths in Active Directory
|
Sep 18, 2024 |
|
Episode 100: Celebrating 100 Episodes and Looking Ahead
|
Sep 11, 2024 |
|
Episode 99: How Cyber-Informed Engineering Builds Resilience
|
Sep 04, 2024 |
|
Episode 98: Transparency as a Tool to Combat Insider Threats
|
Aug 28, 2024 |
|
Episode 97: How Far We've Come preceding CIS's 25th Birthday
|
Aug 21, 2024 |
|
Episode 96: Making Continuous Compliance Actionable for SMBs
|
Aug 14, 2024 |
|
Episode 95: AI Augmentation and Its Impact on Cyber Defense
|
Aug 07, 2024 |
|
Episode 94: Community Defense at the ISAC Annual Meeting
|
Jul 31, 2024 |
|
Episode 93: Keeping Societal Confidence in a Connected World
|
Jul 24, 2024 |
|
Episode 92: A Framework to Counter Evolving Cyber Threats
|
Jul 17, 2024 |
|
Episode 91: What You Need to Know about CIS Controls v8.1
|
Jul 10, 2024 |
|
Episode 90: Migrating to the Cloud with Control Continuity
|
Jul 03, 2024 |
|
Episode 89: How Threat Actors Are Using GenAI as an Enabler
|
Jun 26, 2024 |
|
Episode 88: The Evolution of the Role of a CISO
|
Jun 19, 2024 |
|
Episode 87: Marking 11 Years as a Verizon DBIR Contributor
|
Jun 05, 2024 |
|
Episode 86 Evangelizing CIS's Message at RSAC 2024
|
May 29, 2024 |
|
Episode 85: Reenergizing Collective Action at RSAC 2024
|
May 22, 2024 |
|
Episode 84: Why We Need to Define Reasonable Cybersecurity
|
May 15, 2024 |
|
Episode 83: Why Meeting in Person Matters to CIS Employees
|
May 01, 2024 |
|
Episode 82: How CIS Leadership Values Team Building Events
|
Apr 24, 2024 |
|
Episode 81: Exploring IAM for Identity Management Day 2024
|
Apr 10, 2024 |
|
Episode 80: Advancing Common Good in Cybersecurity – Part 2
|
Apr 03, 2024 |
|
Episode 79: Advancing Common Good in Cybersecurity – Part 1
|
Mar 27, 2024 |
|
Episode 78: Conductors of Risk Building Harmony in Ambiguity
|
Mar 13, 2024 |
|
Episode 77: How to Use Data to Make Cybersecurity Decisions
|
Feb 28, 2024 |
|
Episode 76: The Role of Thought Leadership in Cybersecurity
|
Feb 16, 2024 |
|
Episode 75: How GenAI Continues to Reshape Cybersecurity
|
Feb 02, 2024 |
|
Episode 74: The Nexus of Cybersecurity & Privacy Legislation
|
Jan 19, 2024 |
|
Episode 73: A YIR for Our 2023 Cybersecurity Predictions
|
Jan 05, 2024 |
|
Episode 72: Cybersecurity in Education as a Balancing Act
|
Dec 22, 2023 |
|
Episode 71: Advancing K-12 Cybersecurity Through Community
|
Dec 08, 2023 |
|
Episode 70: How the Media Molds Public Perception of Infosec
|
Nov 22, 2023 |
|
Episode 69: How the NCSR Assessment Sows SLTT Cyber Maturity
|
Nov 09, 2023 |
|
Episode 68: Designing Cyber Defense as a Partnership Effort
|
Oct 27, 2023 |
|
Episode 67: Seizing the Moment after a Cybersecurity Audit
|
Oct 13, 2023 |
|
Episode 66: How RABET-V Verifies Non-Voting Election Tech
|
Oct 06, 2023 |
|
Episode 65: Making Cyber Risk Analysis Practical with QRA
|
Sep 29, 2023 |
|
Episode 64: Defining Your Data Management Standards
|
Sep 15, 2023 |
|
Episode 63: Building Capability and Integration with SBOMs
|
Sep 01, 2023 |
|
Episode 62: Inside the 'Spidey Sense' of a Pentester
|
Aug 18, 2023 |
|
Episode 61: Overcoming Pre-Audit Scaries Through Governance
|
Aug 04, 2023 |
|
Episode 60: Guiding Vendors to IoT Security by Design
|
Jul 21, 2023 |
|
Episode 59: Probing the Modern Role of the Pentest
|
Jul 07, 2023 |
|
Episode 58: Inside CIS's Award-Winning Workplace Culture
|
Jun 23, 2023 |
|
Episode 57: Celebrating the 20th Anniversary of the MS-ISAC!
|
Jun 09, 2023 |
|
Episode 56: Cybersecurity Risks and Rewards of LLMs
|
May 26, 2023 |
|
Episode 55: Live at RSA Conference 2023
|
May 12, 2023 |
|
Episode 54: How to Get Started in Cybersecurity
|
Apr 28, 2023 |
|
Episode 53: Fostering a Neurodiverse Cybersecurity Industry
|
Apr 14, 2023 |
|
Episode 52: Back in the Buzz of RSA Conference
|
Mar 31, 2023 |
|
Episode 51: Making a Roadmap for Your Cybersecurity Journey
|
Mar 15, 2023 |
|
Episode 50: The Best of Cybersecurity Where You Are
|
Mar 03, 2023 |
|
Episode 49: Artificial Intelligence and Cybersecurity
|
Feb 17, 2023 |
|
Episode 48: 3 Trends to Watch in the Cybersecurity Industry
|
Feb 03, 2023 |
|
Episode 47: How Security and Compliance Support Each Other
|
Jan 06, 2023 |
|
Episode 46: Integration as a Theme for 2023
|
Dec 30, 2022 |
|
Episode 45: The Importance of Mentorship
|
Dec 16, 2022 |
|
Episode 44: A Zero Trust Framework Knows No End
|
Dec 02, 2022 |
|
Episode 43: Giving Back Through CIS CARES
|
Nov 18, 2022 |
|
Episode 42: Advocacy for the Underserved
|
Oct 28, 2022 |
|
Episode 41: A Blueprint for Ransomware Defense
|
Oct 21, 2022 |
|
Episode 40 See Yourself in Cyber to Be Cyber Smart
|
Oct 07, 2022 |
|
Episode 39: Cybersecurity at Scale
|
Sep 16, 2022 |
|
Episode 38: How the Cyber Threat Landscape Is Changing
|
Sep 02, 2022 |
|
Episode 37: Collaboration at the 15th Annual MS-ISAC Meeting
|
Aug 19, 2022 |
|
Episode 36: Strong Elections are Cyber STRONG
|
Aug 05, 2022 |
|
Episode 35: Remembering the Late Alan Paller
|
Jul 15, 2022 |
|
Episode 34: A Survey of Hacking in Hollywood
|
Jul 08, 2022 |
|
Episode 33" The Shift-Left of IoT Security to Vendors
|
Jun 27, 2022 |
|
Episode 32: What You Need to Know Ahead of RSA 2022
|
Jun 03, 2022 |
|
Episode 31: To Achieve ICS Security Today, Look to Yesterday
|
May 19, 2022 |
|
Episode 30: Solving Cybersecurity at Scale with Nonprofits
|
May 06, 2022 |
|
Episode 29: Conceptualizing Reasonableness for Risk Analysis
|
Apr 28, 2022 |
|
Episode 28: The Convergence of Cybersecurity and Public Policy
|
Apr 08, 2022 |
|
Episode 27: Cyber Scams
|
Mar 29, 2022 |
|
Episode 26: Automating the Secure Configuration Management Process
|
Mar 11, 2022 |
|
Episode 25: Building an Internal Incident Response Team
|
Feb 25, 2022 |
|
Episode 24: How Do I Start a Career in Cybersecurity?
|
Feb 11, 2022 |
|
Episode 23: Cybersecurity Predictions for 2022
|
Jan 31, 2022 |
|
Episode 22: CIS Behind the Veil: Log4j
|
Jan 21, 2022 |
|
Episode 21: Year In Review; A List of our Favorite Episodes
|
Dec 28, 2021 |
|
Episode 20: The State of Election Cybersecurity
|
Dec 13, 2021 |
|
Episode 19: For Data Compliance, Automation is Key
|
Nov 15, 2021 |
|
Episode 18: Top 5 Scariest Malware
|
Oct 29, 2021 |
|
Episode 17: Cybersecurity Awareness Month: It's All About the Big Picture
|
Oct 13, 2021 |
|
Episode 16: Cybersecurity: Think INSIDE the Box
|
Sep 27, 2021 |
|
Episode 15: Cybersecurity Success Takes Soft Skills
|
Sep 10, 2021 |
|
Episode 14: The Top 5 Cybersecurity Tips for the Family
|
Sep 01, 2021 |
|
Episode 13: What's Important to You in Cybersecurity? A Host Q&A
|
Aug 23, 2021 |
|
Episode 12: Cybersecurity and Government: Less Wizardry, More Policy
|
Jul 30, 2021 |
|
Episode 11: Remote Attestation Helps Zero Trust
|
Jul 16, 2021 |
|
Episode 10: Hospitals in Need of Cybersecurity STAT!
|
Jun 28, 2021 |
|
Episode 9: Mitigating Risk: Information Security Governance
|
Jun 11, 2021 |
|
Episode 8: CIS Controls v8...First Impressions
|
May 28, 2021 |
|
Episode 7: CIS Controls v8...It’s Not About the List
|
May 14, 2021 |
|
Episode 6: 2020 Elections Year in Review
|
Apr 23, 2021 |
|
Episode 5: The Tools of Cyber Defense...an Ongoing, Repetitive Process
|
Apr 12, 2021 |
|
Episode 4: Dynamics of Cyber Defense...an Ongoing, Repetitive Process
|
Mar 26, 2021 |
|
Episode 3: Third-party Risk Management – Beyond the Questionnaire
|
Mar 12, 2021 |
|
Episode 2: Trends: Then, Now, and Into the Future
|
Mar 05, 2021 |
|
Episode 1: Welcome to the Basics
|
Jan 27, 2021 |