SANS Security Leadership Poster – Sponsored by NNT
As the threat landscape continues to expand and data breaches continue to grow in size and scale, organizations now more than ever need a set of prioritized actions and actionable ways to stop today’s most dangerous attacks. For organizations looking for clarity on what really needs to be focused on in terms of cyber security defenses, NNT recommends the CIS Controls.
The CIS Controls are a set of prioritized actions that set out to answer the most fundamental question in cybersecurity – what do we need to do to stop known attacks? The Controls take leading threat data from forensic experts across all industries and transform it into actionable controls to achieve better overall cybersecurity defense.
The SANS Institute supports the CIS Controls and recently published this years’ Security Leadership Poster:
Five Keys for Building a Cybersecurity Program and CIS Controls Version 7.1
This poster breaks down the 20 CIS Controls into three categories: Basic, Foundational, and Organizational. By covering the first six controls, your organization can mitigate the majority of security incidents – a recent study found that 85% of cyberattacks could have been prevented had the first five CIS Controls been implemented.
Want clarity on what you REALLY need to be doing by way of security best practice in your organization? Left scratching your head for clearer guidance after reading the PCI DSS, NERC CIP, GDPR or any other Governance, Risk and Compliance (GRC) standard? Still confused about what you must do and should do in terms of data protection for your business, and why? NNT recommends the CIS Controls as an essential ‘go to’ resource for any data security and compliance professional.
Our thanks to the Center for Internet Security for continuing to expand the world’s knowledge and understanding of cyber security best practices.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.