www.cisecurity.org Open in urlscan Pro
2606:4700::6812:1d59  Public Scan

Submitted URL: https://learn.cisecurity.org/e/799323/-content-cybersecurity-monthly/4v2yxs/2350534340/h/QtzrhIgPON_aj6-dq59Rm_d4tEnsc5IivLrU...
Effective URL: https://www.cisecurity.org/insights/podcast/episode-111-distilling-a-first-principle-of-cybersecurity?utm_source=pardot&utm...
Submission: On December 19 via api from US — Scanned from CH

Form analysis 0 forms found in the DOM

Text Content

This website uses cookies

You’re here because you take cybersecurity seriously, and so does CIS. The
information we track while users are on our websites helps us analyze site
traffic, optimize site performance, improve our services, and identify new
products and services of interest to our users. To learn more please see
our Privacy Policy.

AcceptDecline

You need to enable JavaScript to run this app.

Stay aware of emerging cyber, physical, and information threats with ThreatWA™ |
Subscribe Now

CIS Hardened Images®SupportCIS WorkBench Sign In
Alert Level: guarded
Company
Back
Company
Who We AreCIS is an independent, nonprofit organization with a mission to create
confidence in the connected world.

About Us
Leadership Principles
Leadership Team
Testimonials
Media
Events
Contact Us

Solutions
Back
Solutions
Secure Your Organization
CIS Critical Security Controls®Prioritized & simplified best practices
CIS Controls CommunityHelp develop and maintain the Controls
CIS RAMInformation security risk assessment method
CIS CSATAssess & measure Controls implementation
Secure Specific Platforms
CIS Benchmarks™100+ vendor-neutral configuration guides
CIS Benchmarks CommunityDevelop & update secure configuration guides
CIS-CAT®ProAssess system conformance to CIS Benchmarks
CIS Hardened Images®Virtual images hardened to CIS Benchmarks on cloud service
provider marketplaces
Track Specific Threats
IndustriesYour industry's specific threats & needs
TopicsDive deeper into specific cybersecurity topics
ThreatWA™Insights into emerging cyber & physical threats
CIS SecureSuite®Start secure and stay secure with integrated cybersecurity tools
and resources designed to help you implement CIS Benchmarks and CIS Controls
Learn MoreApply Now
U.S. State, Local, Tribal & Territorial Governments
Memberships
MS-ISAC®Cybersecurity resource for SLTT Governments
EI-ISAC®Election-focused cyber defense suite
Elections
Election Security Tools And ResourcesSources to support the cybersecurity needs
of the election community
Services for Members
Albert Network Monitoring®Cost-effective Intrusion Detection System
Managed Security ServicesSecurity monitoring of enterprises devices
CIS Endpoint Security ServicesDevice-level protection and response
CIS CyberMarket®Savings on training and software
Malicious Domain Blocking and Reporting PlusPrevent connection to harmful web
domains
View All CIS Services
View All Products & Services
Insights
Back
Insights
InsightsExplore trending articles, expert perspectives, real-world applications,
and more from the best minds in cybersecurity and IT.

Advisories
Blog
Case Studies
Spotlights
Newsletters
Podcasts
Webinars
Whitepapers
View All Insights
Join CIS
Back
Join CIS
Get InvolvedJoin us on our mission to secure online experiences for all. Become
a CIS member, partner, or volunteer—and explore our career opportunities.

CIS SecureSuite® Membership
Multi-State ISAC (MS-ISAC®)
Elections Infrastructure ISAC (EI-ISAC®)
CIS CyberMarket® Vendors
CIS Communities
Our Partners
Careers



HomeInsightsPodcastsEpisode 111: Distilling a First Principle of Cybersecurity


EPISODE 111: DISTILLING A FIRST PRINCIPLE OF CYBERSECURITY

 

Click for sound






47:04










 

In episode 111 of Cybersecurity Where You Are, Tony Sager is joined by Rick
Howard, N2K Chief Security Officer and the Chief Analyst and Senior Fellow at
The Cyberwire. Together, they discuss a first principle of cybersecurity
proposed by Rick in his book, Cybersecurity First Principles: A Reboot of
Strategy and Tactics.

Here are some highlights from our episode:

 * 04:30. What drove the need to formulate a foundational cybersecurity
   assumption
 * 07:44. How other "first" principles of cybersecurity have failed
 * 14:13. The three elements of Rick's first principle of cybersecurity
 * 25:55. How to derive action and improvements from Rick's first principle
 * 40:34. Tips on getting started with a risk forecasting strategy


RESOURCES

 * Episode 105: Context in Cyber Risk Quantification
 * FAIR: A Framework for Revolutionizing Your Risk Analysis
 * Election Security Spotlight – CIA Triad
 * Episode 44: A Zero Trust Framework Knows No End
 * Executive Order on Improving the Nation’s Cybersecurity
 * Cybersecurity Canon
 * Superforecasting: The Art and Science of Prediction
 * How to Measure Anything in Cybersecurity Risk

If you have some feedback or an idea for an upcoming episode of Cybersecurity
Where You Are, let us know by emailing podcast@cisecurity.org.

Subscribe to Our Podcast
Subscribe to Our Podcast

About
Leadership
Board
Communities
Careers
Media
Testimonials
Events
US Cyber Challenge
Support
Contact
Products And Tools
CIS Critical Security Controls®
CIS Benchmarks™
CIS Hardened Images®
CIS SecureSuite®

CIS-CAT®Lite
CIS-CAT®Pro
CIS RAM
CIS CSAT
CIS WorkBench

ThreatWA™
For SLTT Governments
MS-ISAC®
EI-ISAC®
Election Resources

CIS Services®
Albert Network Monitoring
Managed Security Services
Endpoint Security Services
Malicious Domain Blocking and Reporting Plus

CIS CyberMarket®
Explore
Blog
Whitepapers
Newsletters
Webinars
Case Studies
Spotlights
Videos

Copyright © 2024 Center for Internet Security®

Privacy Notice
TwitterFacebookYouTubeLinkedIn