Cybersecurity Where You Are (video)

Episode 161: An Ecosystem-Wide Approach to CNI Resilience


Listen Later

In Episode 161 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Mishal Makshood, Azure Partner Alliance Manager at the Center for Internet Security® (CIS®), and David Kalish, Sr. Cybersecurity Solutions Engineer at CIS. Together, they explore how CIS Hardened Images® help to secure cloud environments and strengthen critical national infrastructure (CNI) resilience through collaboration.

Mishal and David explain how these virtual machine images, which are pre-configured to the CIS Benchmarks®, serve as secure, scalable blueprints for cloud deployments. They highlight how CIS Hardened Images reduce human error, accelerate compliance, and foster trust across a global cybersecurity ecosystem that includes hyperscalers, supply chains, and public-private partnerships.

Tony shares the origin story of the CIS Hardened Images and reflects on the evolution of cybersecurity from isolated efforts to a cooperative model built on shared standards and integrated tooling. The group also discusses how CIS Hardened Images align to frameworks and how they help organizations navigate multi-cloud environments while maintaining consistent security postures. Here are some highlights from our episode:

  • 00:50. Introductions to Mishal and David
  • 01:36. What CIS Hardened Images are and why they matter
  • 03:14. Why CIS Hardened Images are uniquely suited to strengthening CNI resilience
  • 04:24. The cultural shift toward working as an ecosystem to start from secure baselines
  • 06:34. The origin story of the CIS Hardened Images
  • 10:32. The value of taking guesswork out of secure configuration management in the cloud
  • 13:44. How CIS Hardened Images support compliance directly and through the CIS Critical Security Controls® (CIS Controls®)
  • 20:39. Building trust through cloud partnerships and collaboration
  • 28:50. The foundational role of configuration management in cybersecurity
  • 34:35. Getting started with strengthening your cloud security foundation

Resources

  • CIS Hardened Images® List
  • Secure by Design: A Guide to Assessing Software Security Practices
  • Software Supply Chain Security
  • 25 Years of Creating Confidence in the Connected World
  • Mapping and Compliance with the CIS Controls
  • Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1
  • Build a Zero Trust Roadmap for FinServ with CIS SecureSuite
  • Episode 154: Integration of Incident Response into DevSecOps
  • How to Construct a Sustainable GRC Program in 8 Steps

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Hacked by Hacked

Hacked

188 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,009 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

372 Listeners

Risky Business by Risky Business Media

Risky Business

373 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

651 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,024 Listeners

Smashing Security by Graham Cluley

Smashing Security

319 Listeners

Click Here by Recorded Future News

Click Here

419 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,098 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

178 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

194 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners

Risky Bulletin by Risky Business Media

Risky Bulletin

45 Listeners