Strategies to Address SANS Critical Controls 10 and 11 - Secure Configurations and Control of Network Devices

  • Webcast Aired Thursday, 24 Sep 2015 1:00PM EDT (24 Sep 2015 17:00 UTC)
  • Speakers: Michelle Johnson Cobb, John Pescatore, Brian Kelly

Adopters of the Critical Security Controls have found they can prevent more attacks, detect attacks faster and demonstrate significant reductions in business impact due to cyberattacks. Key to realizing those gains are streamlined security processes backed by technology to increase the effectiveness and efficiency of security controls. The latest techniques to automate risk assessments and changes can cut management time 80%, ease compliance burdens and reduce IT security risks.

No matter what stage you are in, whether looking at the Critical Controls for the first time, or deciding how to move up the maturity curve to expand your implementation, this webinar can help.

In this session you will:

  • Get an update on the current threat landscape and the latest changes to the Critical Security Controls
  • Learn how to automate firewall compliance audits and get on-demand compliance assessments in minutes
  • Hear how automated tools verify standard device configurations and internal policies Find out how visibility of the network topology and access paths helps you quickly detect vulnerabilities on network devices
  • Discover how to remove unneeded rules by managing the rule lifecycle