1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

There are mobile and IoT companion documents for the CIS (Top 20) Critical Security Controls

Discussion in 'Network World' started by RSS, Jul 29, 2016.

  1. RSS

    RSS New Member Member

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

    Most people who have anything to do with cybersecurity are familiar with the Center for Internet Security (CIS) Critical Security Controls, also commonly known as the SANS Top 20, or more simply the Controls. This list consists of a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks.

    Implementing the Controls is no guarantee an organization will have a bullet-proof defensive posture, but it significantly reduces both the risk that a breach will happen and the impact to the organization if such an event were to occur. What's more, theControls constitute a minimum level of security that any organization that collects or maintains personal or sensitive information should meet.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page