Posts tagged CIS Controls

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Exposure Management

8 Steps to Successfully Implement the CIS Top 20 Controls in Your Organization

Laurel Marotta's avatar

Laurel Marotta

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Exposure Management

CIS Critical Security Control 20: Measure Your Security Standing with Penetration Tests and Red Team Exercises

Brian Carey's avatar

Brian Carey

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Detection and Response

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Christy Draicchio's avatar

Christy Draicchio

CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security

Exposure Management

CIS Critical Security Control 18: Breaking Down the Control Chaos of Application Software Security

Rapid7's avatar

Rapid7

CIS Critical Security Control 17: Some Assembly Required for Your Security Awareness and Training Program

Exposure Management

CIS Critical Security Control 17: Some Assembly Required for Your Security Awareness and Training Program

Brian Carey's avatar

Brian Carey

Critical Control 16: Account Monitoring and Control

Security Operations

Critical Control 16: Account Monitoring and Control

Michael Cole's avatar

Michael Cole

CIS Critical Security Control 15 Explained: Wireless Access Control – Are You Really Managing Your WiFi?

Security Operations

CIS Critical Security Control 15 Explained: Wireless Access Control – Are You Really Managing Your WiFi?

Bob Boyles's avatar

Bob Boyles

CIS Critical Control 14 Explained: Controlled Access Based on the Need to Know

Security Operations

CIS Critical Control 14 Explained: Controlled Access Based on the Need to Know

Brian Carey's avatar

Brian Carey

CIS Critical Security Control 13:  Data Protection Explained

Security Operations

CIS Critical Security Control 13: Data Protection Explained

Michael Cole's avatar

Michael Cole

CIS Critical Control 12: Boundary Defense Explained

Security Operations

CIS Critical Control 12: Boundary Defense Explained

Christy Draicchio's avatar

Christy Draicchio

CIS Critical Control 11: Secure Configurations for Network Devices

Security Operations

CIS Critical Control 11: Secure Configurations for Network Devices

Jason Beatty's avatar

Jason Beatty

CIS Critical Control 10: Data Recovery Capability

Security Operations

CIS Critical Control 10: Data Recovery Capability

Anna Nielsen's avatar

Anna Nielsen

CIS Critical Control 9: Limitation and Control of Ports, Protocols, and Services

Exposure Management

CIS Critical Control 9: Limitation and Control of Ports, Protocols, and Services

Cindy Jones's avatar

Cindy Jones

The CIS Critical Controls Explained- Control 8: Malware Defenses

Exposure Management

The CIS Critical Controls Explained- Control 8: Malware Defenses

Caspian Kilkelly's avatar

Caspian Kilkelly

The CIS Critical Controls Explained - Control 7: Email and Web browser protection

Exposure Management

The CIS Critical Controls Explained - Control 7: Email and Web browser protection

Caspian Kilkelly's avatar

Caspian Kilkelly

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Exposure Management

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Cindy Jones's avatar

Cindy Jones

The CIS Critical Security Controls Series

Exposure Management

The CIS Critical Security Controls Series

Joel Cardella's avatar

Joel Cardella

The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege

Exposure Management

The CIS Critical Security Controls Explained - Control 4: Controlled Use of Administrative Privilege

Joel Cardella's avatar

Joel Cardella

The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management

Exposure Management

The CIS Critical Security Controls Explained - Control 3: Continuous Vulnerability Management

Magen Wu's avatar

Magen Wu

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Exposure Management

The CIS Critical Security Controls Explained - Control 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Joel Cardella's avatar

Joel Cardella

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Exposure Management

The CIS Critical Security Controls Explained - Control 1: Inventory and Control of Hardware Assets

Caspian Kilkelly's avatar

Caspian Kilkelly