Cybersecurity Where You Are (video)

Episode 151: 2025 Cybersecurity Predictions H2 Review — Pt 2


Listen Later

In episode 151 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager conclude their mid-year review of 12 Center for Internet Security® (CIS®) experts' cybersecurity predictions for 2025. Here are some highlights from our episode:

  • 01:12. The importance of consolidating security operations and using what already exists
  • 03:18. The promise of generative artificial intelligence (GenAI) in relieving grunt work
  • 08:26. The great responsibility and burden of integrating GenAI into business operations
  • 10:53. How control and inspection generate trust in systems
  • 17:57. Post-quantum cryptography, IoT in edge computing, and GenAI's sociopolitical risks
  • 30:21. The need for a more holistic understanding of compliance
  • 33:34. Why zero trust doesn't mean "no trust"
  • 36:56. The need for AI as an element of critical security control
  • 41:33. The dynamic challenge of protecting all assets with varying levels of security

Resources

  • 12 CIS Experts' Cybersecurity Predictions for 2025
  • Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1
  • Episode 135: Five Lightning Chats at RSAC Conference 2025
  • Establishing Essential Cyber Hygiene
  • Episode 95: AI Augmentation and Its Impact on Cyber Defense
  • Guide to Asset Classes: CIS Critical Security Controls v8.1
  • An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms
  • An Introduction to Artificial Intelligence
  • Episode 120: How Contextual Awareness Drives AI Governance
  • Episode 118: Preparing for Post-Quantum Cryptography
  • Episode 63: Building Capability and Integration with SBOMs
  • Episode 99: How Cyber-Informed Engineering Builds Resilience
  • Mapping and Compliance with the CIS Controls
  • Mapping and Compliance with the CIS Benchmarks
  • CIS Community Defense Model 2.0

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Hacked by Hacked

Hacked

181 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,003 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

370 Listeners

Risky Business by Patrick Gray

Risky Business

373 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

638 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,017 Listeners

Smashing Security by Graham Cluley

Smashing Security

322 Listeners

Click Here by Recorded Future News

Click Here

416 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,002 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Hacking Humans by N2K Networks

Hacking Humans

313 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

188 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners