Cybersecurity Where You Are (video)

Episode 139: Community Building for the Cyber-Underserved


Listen Later

In episode 139 of Cybersecurity Where You Are, Tony Sager is joined by Amelia Gifford, Sr. Manager, Administration, at the Center for Internet Security®(CIS®); and George Bailey, Director of Purdue cyberTAP. Together, they discuss how the 2025 grant from the Alan Paller Laureate Program will support Purdue cyberTAP's mission of community building for the cyber-underserved. Here are some highlights from our episode:

  • 01:02. Honoring a legacy of making cybersecurity practical and accessible
  • 03:34. The business of giving products away to benefit the cybersecurity community
  • 05:00. The use of the CIS Critical Security Controls (CIS Controls) to help rural electricity cooperatives in Indiana
  • 11:00. Methodology, tooling, and repeatability as part of a lifecycle of realizing a good idea
  • 11:56. Cross-Mapping as a means to help people live with so many security frameworks
  • 12:59. Accountability and re-assessment as methods for measuring program success
  • 14:59. The power of community in prioritizing the CIS Controls
  • 16:38. Community building as a way to navigate the cybersecurity business together
  • 17:42. A controlled Controls experiment to generate data, learn lessons, and create feedback
  • 19:03. Progress reporting as a way to foster connections
  • 24:39. Feedback on the Alan Paller Laureate Program application process
  • 26:30. Focus on cybersecurity community impact as a consideration for future applicants
  • 30:31. Parting thoughts about the grant program and an invitation to reach out to George

Resources

  • Center for Internet Security Awards Nearly $250,000 to Purdue University’s Technical Assistance Program
  • Episode 114: 3 Board Chairs Reflect on 25 Years of Community
  • Episode 97: How Far We've Come preceding CIS's 25th Birthday
  • CIS Critical Security Controls v8.1 Industrial Control Systems (ICS) Guide
  • SEC366: CIS Implementation Group 1™
  • How to Plan a Cybersecurity Roadmap in 4 Steps
  • CIS SecureSuite® Membership
  • Mapping and Compliance with the CIS Controls
  • Reasonable Cybersecurity Guide

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Hacked by Hacked

Hacked

190 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

655 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,023 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,041 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners