Did you know that implementing the Top 20 CIS Security controls from
CIS highly reduces your
chances of suffering a successful cyberattack?.
CSC #1: Inventory of Authorized and Unauthorized Devices.
CSC #2: Inventory of Authorized and Unauthorized Software.
CSC #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.
CSC #5: Controlled Use of Administrative Privileges.
CSC #6: Maintenance, Monitoring and Analysis of Audit Logs
CSC #7: Email and Web Browser Protections
CSC #8: Malware Defenses
CSC #9: Limitation and Control of Network Ports, Protocols, and Services
CSC #10: Data Recovery Capability
CSC #11: Secure Configuration of Network Devices such as Firewalls, Routers and Switches
CSC #12: Boundary Defense
CSC #13: Data Protection
CSC #14: Controlled Access based on the Need to Know
CSC #15: Wireless Access Control
CSC #16: Account Monitoring & Control
CSC #17: Security Skills Assessment and Appropriate Training to Fill Gaps
CSC #18: Application Software Security
CSC #19: Incident Response & Management
CSC #20: Penetration Tests and Red Team Exercises