Previously known as the SANS Top 20, the CIS Critical Security Controls (CIS Controls) are arguably the most effective technical controls against known cyber-attacks. 'Due to competing priorities and demands, however, organizations may not have the expertise or resources to figure out how to implement and operationalize the Critical Security Controls in their environments. 'In this webcast, we'll walk through implementation examples around Critical Security Controls 1 & 2 in the Cisco Firepower NGFW and NGIPS platform.
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC 2: Inventory of Authorized and Unauthorized Software