Posts tagged CIS Controls

Exposure Management
8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization
Laurel Marotta

Exposure Management
CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises
Brian Carey

Detection and Response
CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy
Christy Draicchio

Exposure Management
CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security
Rapid7

Exposure Management
CIS Critical Security Control 17: Some Assembly Required for Your Security Awareness and Training Program
Brian Carey

Security Operations
Critical Control 16: Account Monitoring and Control
Michael Cole

Security Operations
CIS Critical Security Control 15 Explained: Wireless Access Control – Are You Really Managing Your WiFi?
Bob Boyles

Security Operations
CIS Critical Control 14 Explained: Controlled Access Based on the Need to Know
Brian Carey

Security Operations
CIS Critical Security Control 13: Data Protection Explained
Michael Cole

Security Operations
CIS Critical Control 12: Boundary Defense Explained
Christy Draicchio

Security Operations
CIS Critical Control 11: Secure Configurations for Network Devices
Jason Beatty

Security Operations
CIS Critical Control 10: Data Recovery Capability
Anna Nielsen

Exposure Management
CIS Critical Control 9: Limitation and Control of Ports, Protocols, and Services
Cindy Jones

Exposure Management
The CIS Critical Controls Explained- Control 8: Malware Defenses
Caspian Kilkelly

Exposure Management
The CIS Critical Controls Explained - Control 7: Email and Web browser protection
Caspian Kilkelly

Exposure Management
The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs
Cindy Jones

Exposure Management
The CIS Critical Security Controls Series
Joel Cardella

Exposure Management
The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege
Joel Cardella

Exposure Management
The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management
Magen Wu

Exposure Management
The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Joel Cardella

Exposure Management
The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets
Caspian Kilkelly