www.cisecurity.org
Open in
urlscan Pro
2606:4700::6812:1d59
Public Scan
Submitted URL: https://learn.cisecurity.org/e/799323/-content-cybersecurity-monthly/4v2yxs/2350534340/h/QtzrhIgPON_aj6-dq59Rm_d4tEnsc5IivLrU...
Effective URL: https://www.cisecurity.org/insights/podcast/episode-111-distilling-a-first-principle-of-cybersecurity?utm_source=pardot&utm...
Submission: On December 19 via api from US — Scanned from CH
Effective URL: https://www.cisecurity.org/insights/podcast/episode-111-distilling-a-first-principle-of-cybersecurity?utm_source=pardot&utm...
Submission: On December 19 via api from US — Scanned from CH
Form analysis
0 forms found in the DOMText Content
This website uses cookies You’re here because you take cybersecurity seriously, and so does CIS. The information we track while users are on our websites helps us analyze site traffic, optimize site performance, improve our services, and identify new products and services of interest to our users. To learn more please see our Privacy Policy. AcceptDecline You need to enable JavaScript to run this app. Stay aware of emerging cyber, physical, and information threats with ThreatWA™ | Subscribe Now CIS Hardened Images®SupportCIS WorkBench Sign In Alert Level: guarded Company Back Company Who We AreCIS is an independent, nonprofit organization with a mission to create confidence in the connected world. About Us Leadership Principles Leadership Team Testimonials Media Events Contact Us Solutions Back Solutions Secure Your Organization CIS Critical Security Controls®Prioritized & simplified best practices CIS Controls CommunityHelp develop and maintain the Controls CIS RAMInformation security risk assessment method CIS CSATAssess & measure Controls implementation Secure Specific Platforms CIS Benchmarks™100+ vendor-neutral configuration guides CIS Benchmarks CommunityDevelop & update secure configuration guides CIS-CAT®ProAssess system conformance to CIS Benchmarks CIS Hardened Images®Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces Track Specific Threats IndustriesYour industry's specific threats & needs TopicsDive deeper into specific cybersecurity topics ThreatWA™Insights into emerging cyber & physical threats CIS SecureSuite®Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls Learn MoreApply Now U.S. State, Local, Tribal & Territorial Governments Memberships MS-ISAC®Cybersecurity resource for SLTT Governments EI-ISAC®Election-focused cyber defense suite Elections Election Security Tools And ResourcesSources to support the cybersecurity needs of the election community Services for Members Albert Network Monitoring®Cost-effective Intrusion Detection System Managed Security ServicesSecurity monitoring of enterprises devices CIS Endpoint Security ServicesDevice-level protection and response CIS CyberMarket®Savings on training and software Malicious Domain Blocking and Reporting PlusPrevent connection to harmful web domains View All CIS Services View All Products & Services Insights Back Insights InsightsExplore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT. Advisories Blog Case Studies Spotlights Newsletters Podcasts Webinars Whitepapers View All Insights Join CIS Back Join CIS Get InvolvedJoin us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities. CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Our Partners Careers HomeInsightsPodcastsEpisode 111: Distilling a First Principle of Cybersecurity EPISODE 111: DISTILLING A FIRST PRINCIPLE OF CYBERSECURITY Click for sound 47:04 In episode 111 of Cybersecurity Where You Are, Tony Sager is joined by Rick Howard, N2K Chief Security Officer and the Chief Analyst and Senior Fellow at The Cyberwire. Together, they discuss a first principle of cybersecurity proposed by Rick in his book, Cybersecurity First Principles: A Reboot of Strategy and Tactics. Here are some highlights from our episode: * 04:30. What drove the need to formulate a foundational cybersecurity assumption * 07:44. How other "first" principles of cybersecurity have failed * 14:13. The three elements of Rick's first principle of cybersecurity * 25:55. How to derive action and improvements from Rick's first principle * 40:34. Tips on getting started with a risk forecasting strategy RESOURCES * Episode 105: Context in Cyber Risk Quantification * FAIR: A Framework for Revolutionizing Your Risk Analysis * Election Security Spotlight – CIA Triad * Episode 44: A Zero Trust Framework Knows No End * Executive Order on Improving the Nation’s Cybersecurity * Cybersecurity Canon * Superforecasting: The Art and Science of Prediction * How to Measure Anything in Cybersecurity Risk If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org. Subscribe to Our Podcast Subscribe to Our Podcast About Leadership Board Communities Careers Media Testimonials Events US Cyber Challenge Support Contact Products And Tools CIS Critical Security Controls® CIS Benchmarks™ CIS Hardened Images® CIS SecureSuite® CIS-CAT®Lite CIS-CAT®Pro CIS RAM CIS CSAT CIS WorkBench ThreatWA™ For SLTT Governments MS-ISAC® EI-ISAC® Election Resources CIS Services® Albert Network Monitoring Managed Security Services Endpoint Security Services Malicious Domain Blocking and Reporting Plus CIS CyberMarket® Explore Blog Whitepapers Newsletters Webinars Case Studies Spotlights Videos Copyright © 2024 Center for Internet Security® Privacy Notice TwitterFacebookYouTubeLinkedIn