Home    About Us    Services    Resources    Careers    Contact Us

Videos

CIS Control 1 - Inventory of Authorized and Unauthorized Devices

CIS Control 2 - Inventory of Authorized and Unauthorized Software

CIS Control 3 - Secure Configurations for Hardware and Software

CIS Control 4 - Continuous Vulnerability Assessment and Remediationq

CIS Control 5 - Controlled Use of Administrative Privileges

CIS Control 6 - Maintenance, Monitoring, and Analysis of Audit Logs

CIS Control 7 - Email and Web Browser Protections

CIS Control 8 - Malware Defenses

CIS Control 9 - Limitation and Control of Network Ports

CIS Control 10 - Data Recovery Capability

CIS Control 11 - Secure Configurations for Network Devices

CIS Control 12 - Boundary Defense

CIS Control 13 - Data Protection

CIS Control 14 - Controlled Access Based on the Need to Know

CIS Control 15 - Wireless Access Control

CIS Control 16 - Account Monitoring and Control

CIS Control 17 - Security Skills Assessment and Appropriate Training to Fill Gaps

CIS Control 18 - Application Software Security

CIS Control 19 - Incident Response and Management

CIS Control 20 - Penetration Tests and Red Team Exercises





  Offline: Leave Message