Back to Basics: A Focus on the First Six Critical Security Controls Against Breach

As in the recent Wannacry ransomware attack, investigations performed after breaches and other security incidents reveal that the majority occur simply because well-known security controls and practices were not implemented or were not working as organisations had assumed.

Rather than a lack of choices in security solutions, the major problem in cyber security is a lack of a defined and repeatable process for selecting, implementing and monitoring the security controls that are most effective against real-world threats.

Most press coverage focuses on advanced targeted threats and zero-day attacks, but most of the damage caused by cyber security incidents is enabled by security programs that have been unable to implement mature processes. The Center for Internet Security (CIS) Critical Security Controls has been successful in providing a framework for addressing those deficiencies and delivering basic foundational levels of security. In particular, the first six of the Critical Security Controls provide a proven jump-start to rapidly reducing the risk of impact to your organisation.

Submit your details below to download your free copy of this latest Sans Institute Spotlight Whitepaper: 

If you see this, leave this form field blank and invest in CSS support.
Your Details (* denotes required field)

Non WiredGov Registrants: Please fill in all the required fields below.

WiredGov Registrants: Simply login here to automatically fill the fields with your information. Alternatively you can fill in the required fields manually.

Share this campaign