Talk With an Expert

Leading Effective Cybersecurity with the Critical Security Controls

Leading Effective Cybersecurity with the Critical Security Controls (PDF, 3.20MB)Published: 08 Mar, 2016
Created by
Wes Whitteker

Over the past several years, global news coverage has been plagued with media headlines of multiple private and public institutions falling victim to significant data breaches. With this fact in mind, it is important to note that these breaches are happening in spite of the fact that there have been heavy investments in cybersecurity resources (people, processes, technology, etc.) over the past several years. When one combines the idea that significant data breaches continue to happen while large investments have been made to mitigate them, it paints a picture of an ineffective response to the problem. As such, two critical questions require further investigation. The first is what is preventing leadership from creating an effective response to the global cybersecurity problem? The second is how can the Critical Security Controls (CSCs) be used by leadership to overcome these challenges and improve effectiveness within their organization?

Leading Effective Cybersecurity with the Critical Security Controls