Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Stop Advanced Adversaries: With the Top 5 Critical Controls


Published on

Unplanned change is the enemy of security and availability. Whether it comes from an advanced adversary, a malicious insider or a trusted employee, understanding change in your IT environment can help you identify the difference between a simple modification and a malicious attack.

Travis Smith, Principal Security Researcher at Tripwire, demonstrates real-world attacks, analyzes how attackers commonly gain access to improperly configured systems, and shows the impact data breaches can have on an organization.

You will get a breakdown of the Center for Internet Security’s (CIS) Critical Security Controls, which when implemented, can reduce your risk of cyber attack by up to 85% by:

• Continuously inventorying all hardware/software assets
• Establishing standard secure configurations
• Running automated vulnerability scanning tools
• Minimizing anomalous behavior with better administrative privileges

Published in: Technology
  • Be the first to comment

  • Be the first to like this