![]() |
Cybersecurity Where You Are (video)Author: Center for Internet Security Language: en-us Genres: Business, Non-Profit, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
Episode 186: Strong Cyber Defense Starts with IT Operations
Episode 186
Wednesday, 6 May, 2026
In episode 186 of Cybersecurity Where You Are, Tony Sager sits down with Tony Krzyzewski, a CIS Critical Security Controls® (CIS Controls®) Ambassador for the Center for Internet Security® (CIS®). Together, they discuss how strong cyber defense starts with the fundamentals of IT operations.Here are some highlights from our episode:00:45. Introductions to Tony Krzyzewski and his background02:19. Tony Krzyzewski's first interaction with the CIS Controls03:47. IT operations: The foundation that makes strong cyber defense possible06:20. How an increasingly connected world makes the CIS Controls essential to cybersecurity09:56. The need for operations people to realize they're part of the cybersecurity solution13:11. The use of Implementation Groups to reduce overload on IT and security teams16:52. How the CIS Controls differ from "umbrella frameworks" like NIST CSF and ISO 2700118:25. CIS Controls mappings and how they help to simplify a surplus of good guidance20:35. How the CIS Controls support improvement programs and Board-level conversations25:38. Tony Krzyzewski's work in creating the CIS Controls Ambassador program27:02. Why a deep view of what's happening at CIS supports Tony Krzyzewski's efforts30:11. Growing international promotion of the CIS Controls and "doing the basics well"ResourcesCIS Critical Security Controls®CIS Controls Ambassador Spotlight: Tony KrzyzewskiEpisode 160: Championing SME Security with the CIS ControlsEpisode 168: Institutionalizing Good Cybersecurity IdeasEpisode 172: Helping CISOs as a CIS Controls AmbassadorEpisode 181: Supply and Demand of Cybersecurity EcosystemsGuide to Implementation Groups (IG): CIS Critical Security Controls v8.1Reasonable CybersecurityMappings to Security FrameworksTranslationsPolicy TemplatesSecuring the AI Ecosystem Begins at the Model LayerIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.







