The Executive’s Guide to the CIS Controls

0
914

The Executive’s Guide to the CIS Controls

Creating a Vulnerability Map, 7 Habits of Highly Effective VM Programs and Air-Gaps

This publication is designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust network security posture, covering topics such as:

  • Secure Configurations for Hardware and Software
  • Continuous Vulnerability Assessment and Remediation
  • Controlled Use of Administrative Privileges
  • Maintenance, Monitoring, and Analysis of Audit Logs

The author, a respected security executive, distills each of the 20 controls down to their key takeaways with illustrative examples, and recommends management actions that readers can follow up with in their organizations.

Download Now

Climbing the Vulnerability Management Mountain

In the first of this new series, we look at the path to vulnerability management excellence. Like climbing a mountain, there is a lot of planning and work required, but when you get to the top, the view is amazing and well worth the journey.

Read More

To Air-Gap or Not Air-Gap Industrial Control Networks

Over the years, many networks in many different verticals from governments, military, financial services, nuclear power plants and industrial manufacturing, to name a few, have been so-called “air-gapped.” Take a look at the pros and cons.

Read More

The 7 Habits of Highly Effective Vulnerability Management

How do you know your vulnerability management program is effective? In order to shed some light on that question, we take a look at seven habits of highly effective VM programs.

Read More

©2019 Tripwire, Inc., All rights reserved.
You signed up for this newsletter on The State of Security blog.

Our mailing address is:

Tripwire, Inc.

308 SW 2nd St
Ste #400

Portland, OR 97204

Add us to your address book

View it in your browser

– Read more