Be the first to like this
Unplanned change is the enemy of security and availability. Whether it comes from an advanced adversary, a malicious insider or a trusted employee, understanding change in your IT environment can help you identify the difference between a simple modification and a malicious attack.
Travis Smith, Principal Security Researcher at Tripwire, demonstrates real-world attacks, analyzes how attackers commonly gain access to improperly configured systems, and shows the impact data breaches can have on an organization.
You will get a breakdown of the Center for Internet Security’s (CIS) Critical Security Controls, which when implemented, can reduce your risk of cyber attack by up to 85% by:
• Continuously inventorying all hardware/software assets
• Establishing standard secure configurations
• Running automated vulnerability scanning tools
• Minimizing anomalous behavior with better administrative privileges