Transforming Your Security Investment into an Early Warning System Against Cyber Threats

  • Webcast Aired Wednesday, 28 May 2014 11:00AM EDT (28 May 2014 15:00 UTC)
  • Speakers: Eric Cole, PhD, Steve Lowing

To secure against cyber-attacks, organizations must vigorously defend their networks and systems from a variety of internal and external threats. To aid in this effort, the SANS Institute publishes and updates 20 Critical Controls for Effective Cyber Defense.

The goal of the Critical Controls is to help organizations develop a defensive posture to protect their critical assets, infrastructure, and information through continuous, automated protection and monitoring of their IT infrastructure.

This talk explores the top 5 Critical Controls and identifies best practices for IT and security personnel when implementing automated solutions to assure that every endpoint on the network is properly protected and in compliance with established security policies.

The Top Five Critical Controls that will be discussed are:

  1. Inventory of Authorized and Unauthorized Devices
  2. Inventory of Authorized and Unauthorized Software
  3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
  4. Continuous Vulnerability Assessment and Remediation
  5. Malware Defenses