Widespread adoption of the Critical Security Controls has proven that it is an effective and efficient way to focus first on the security processes that are necessary to detect, mitigate and avoid advanced targeted threats. The first three Controls focus on having up to date and accurate knowledge of the devices and applications that are on your enterprise networks. All too often, the entry point for a major breach is traced to a misconfigured system or to a PC or device that no one realized was active and had access to sensitive systems - even though numerous scanning and/or asset inventory systems were in place.
In this webinar, John Pescatore of SANs will provide an update to the Critical Security Controls and focus on solution patterns for device and application discovery that are working in real world environments. Issues and obstacles that have been seen in common solutions will be discussed, and how to overcome these in implementing critical controls. Pwnie Express will provide insight into how their enterprise security solution has been enabling customers to stay ahead of threats by providing accurate and timely asset discovery and inventory. Watch a demo of Pwn Pulse, Pwnie Express's enterprise platform, to see first-hand how their intelligent asset discovery solution can assist you in improving your security posture as part of implementing the Critical Security Controls.