How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Many organizations want to know how to get started with their cybersecurity program. That’s why at CIS we prioritized the CIS Critical Security Controls (Controls) into 3 Implementation Groups. Each IG identifies a subset of the CIS Controls that the community assessed to be applicable for an enterprise with a similar risk profile and resources to strive to implement. These IGs represent a horizontal look across the CIS Controls tailored to different types of enterprises. IG1 is geared towards Small Medium Businesses (SMBs), organizations with limited resources to dedicate to IT and cybersecurity and are not responsible for highly sensitive data. We refer to IG1 as “essential cyber hygiene” the foundational set of cyber defense Safeguards that every enterprise should apply to guard against the most common attacks. Come to this talk to learn about IG1 and how to protect your enterprise against the top 5 real-world threats!
SANS Small Business Cyber Summit 2023
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Speaker: Joshua Franklin
View upcoming Summits: http://www.sans.org/u/DuS
Видео How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls) канала SANS Institute
SANS Small Business Cyber Summit 2023
How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls)
Speaker: Joshua Franklin
View upcoming Summits: http://www.sans.org/u/DuS
Видео How SMBs can defend against Top Threats using the CIS Critical Security Controls (Controls) канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
SANS HM Gov Cyber Retraining AcademyTake SEC301 Introduction to Cyber Security at your own paceSANS Training: What's In It For YouVulnerability Management: Is the Program Effective: Part 3 of 3Panel | Mastercard Trust CenterVisions, Priorities and Strategy - Oh My!Board Room Decisions: How to Use Threat-Informed Industrial Risk Management-Jason ChristopherTop 10 Writing Mistakes in Cybersecurity and How You Can Avoid ThemIt's easy to get approval to take a SANS coursePanel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff DoneThe SANS Healthcare Forum 2022: RansomwareSANS Expert Line Up Live from RSAC Conference | April 26, 2023CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS InstituteMeet SANS Fellow: David HoelzerDeveloping CISO Leadership Skills with Frank Kim | ChatGPT for OSINT with Matt Edmondson | April 18Live with Jake Williams | RSA Conference 2022Exploring the Evolution of Cybersecurity Certifications, with Megan Roddie | May 23, 2023Live with Jess Garcia | RSA Conference 2022Live with Chris Cochran | RSA Conference 2022Keynote | Creating a culture of cyber readiness for small businessesICS Fireside Chat- Defining Security Functions to Gain Visibility from PLCs