Presented by CompuNet
Developing an effective security program is a complex undertaking. Let's jumpstart the process! We'll discuss leveraging the Center for Information Security's Critical Security Control framework to identify and prioritize security controls based on efficacy and business impact. After a brief overview of the CIS CSC, we'll discuss the ongoing measurement and reporting necessary to organize a diverse set of tools into a well-managed information security program. We'll also demonstrate and share freely available tools to help organizations perform internal assessments and leverage benchmark configuration guides.