Talk With an Expert

Real-World Case Study: The Overloaded Security Professional's Guide to Prioritizing Critical Security Controls

Real-World Case Study: The Overloaded Security Professional's Guide to Prioritizing Critical Security Controls (PDF, 2.40MB)Published: 27 Dec, 2016
Created by:
Phillip Bosco

Using a real-world case study of a recently compromised company as a framework, we will step inside the aftermath of an actual breach and determine how the practical implementation of Critical Security Controls (CSC) may have prevented the compromise entirely while providing greater visibility inside the attack as it occurred. The breached company's information security 'team' consisted of a single over-worked individual, who found it arduous to identify which critical controls he should focus his limited time implementing. Lastly, we will delve into real-world examples, using previously unpublished research, that serve as practical approaches for teams with limited resources to prioritize and schedule which CSCs will provide the largest impact towards reducing the company's overall risk. Ideally, the observations and approaches identified in this research paper will assist security professionals who may be in similar circumstances.