Define What Attacks the CIS Controls Defend Against
19
Controls Assessment Specification
20
State Adoption of the CIS Controls
21
Feedback
22
CIS Security Assessment Tool (CSAT)
23
Top 10 Sub-Control Scores
24
Bottom 10 Sub-Control Scores
25
Future of the Controls
26
Apply What You've Learned Today
27
Conclusions
Description:
Explore the CIS Controls, one of the world's most popular cybersecurity standards, in this 34-minute RSA Conference talk. Learn about free tools, techniques, and guidance provided by the Center for Internet Security to overcome adoption barriers in your organization. Discover the history and evolution of the CIS Controls, implementation groups, and how to assess your organization's cybersecurity posture. Gain insights into the Community Attack Model, Defense Model, and the future of the Controls. Understand state adoption trends and how to apply the CIS Controls effectively in your cybersecurity strategy.
Cyber-Hygiene for All - An Introduction to the CIS Controls