SlideShare a Scribd company logo
What is your Security Score?
Cybersecurity is one of the top challenges that faces every company. Fortunately,
companies do not have to create their own security program and instead can use a
security framework to jump-start the process. A framework documents security
standards (benchmarks) and processes that help companies define policies and
procedures to implement and manage information security controls.
For more information please visit
https://www.ciotalknetwork.com/what-is-your-security-score/
The challenge for companies is that there are many security frameworks and the myriad
of available technology causes confusion that leads to inaction. The Center for Internet
Security, Inc. (CIS®) describes the current situation: But all of this technology,
information, and oversight has become a veritable ‘Fog of More’ — competing options,
priorities, opinions, and claims that can paralyze or distract an enterprise from vital
action.
What is CIS Benchmarks?
CIS Controls® and CIS Benchmarks tools for companies to assess their security
posture. CIS® “is a forward-thinking, non-profit entity that harnesses the power of a
global IT community to safeguard private and public organizations against cyber
threats.” They created a global security standard and best practices to secure systems
and information against “the most pervasive attacks”.
CIS® defines a prioritized list of 20 best practices (i.e., security controls) that help
organizations improve cyber defenses. Further they group them into three
implementation groups that are relevant for small, medium and large companies. This
flexibility is necessary because small and medium companies cannot necessarily afford
the costs to implement all possible security controls at the highest level of maturity and
automation.
At Encore Electric, Inc., we used the free CIS Controls® Self-Assessment Tool (CSAT)
to benchmark our current security posture. We settled on this tool for a couple of
reasons. First, we wanted to benchmark our security posture with a numeric score that
is simple to understand and communicate to colleagues who have limited knowledge
and experience with information security. Second, we wanted a way to demonstrate our
level of compliance with particular security frameworks. The CSAT cross-references to
other security frameworks such as PCI DSS and NIST 800.
For each of the CIS controls, the CSAT measures the maturity against 4 levels: policy
defined, control implemented, control reported and control automated. Each level of
maturity adds points to an overall score for the CIS benchmarks. The total score ranges
from 0 to 100. The tool maps your responses across the 20 controls, compares with
averages and industry-specific data, and offers simple reports to communicate the
status and results.
Once we completed the benchmark, we now can make decisions on improving our
security posture. We appreciate that CIS® offers consensus-based benchmarks and
controls and objective global standards to better protect our information assets.
What is CIS Benchmark

More Related Content

Similar to What is CIS Benchmark

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
Symantec
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
SALIH AHMED ISLAM
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
Bee_Ware
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
- Mark - Fullbright
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
Christophe Monnier
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration TestingIT Governance Ltd
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
Infosectrain3
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
Ken M. Shaurette
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
Abdulrahman Alamri
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
Metaorange
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
Hafid CHEBRAOUI
 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
Metaorange
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 

Similar to What is CIS Benchmark (20)

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration Testing
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 

More from CIO Talk Network

CIO Professional Network
CIO Professional NetworkCIO Professional Network
CIO Professional Network
CIO Talk Network
 
Going Global Think Local
Going Global Think LocalGoing Global Think Local
Going Global Think Local
CIO Talk Network
 
Mergers and Acquisitions IT Integration Plan
Mergers and Acquisitions IT Integration PlanMergers and Acquisitions IT Integration Plan
Mergers and Acquisitions IT Integration Plan
CIO Talk Network
 
BI Governance Framework
BI Governance FrameworkBI Governance Framework
BI Governance Framework
CIO Talk Network
 
Best Technology Podcasts by IT Leaders
Best Technology Podcasts by IT LeadersBest Technology Podcasts by IT Leaders
Best Technology Podcasts by IT Leaders
CIO Talk Network
 
Managing Relationships, Politics and Image
Managing Relationships, Politics and ImageManaging Relationships, Politics and Image
Managing Relationships, Politics and Image
CIO Talk Network
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth Management
CIO Talk Network
 
Cloud Computing Podcast
Cloud Computing PodcastCloud Computing Podcast
Cloud Computing Podcast
CIO Talk Network
 
IT and Technology Challenges in the Retail Industry
IT and Technology Challenges in the Retail IndustryIT and Technology Challenges in the Retail Industry
IT and Technology Challenges in the Retail Industry
CIO Talk Network
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
CIO Talk Network
 
Would you Recommend Our Company to Your Friends
Would you Recommend Our Company to Your FriendsWould you Recommend Our Company to Your Friends
Would you Recommend Our Company to Your Friends
CIO Talk Network
 
What is Digital Twin Technology
What is Digital Twin TechnologyWhat is Digital Twin Technology
What is Digital Twin Technology
CIO Talk Network
 
CIO Talk Network Contributors.pdf
CIO Talk Network Contributors.pdfCIO Talk Network Contributors.pdf
CIO Talk Network Contributors.pdf
CIO Talk Network
 
BI Governance_ Making it a Reality
BI Governance_ Making it a RealityBI Governance_ Making it a Reality
BI Governance_ Making it a Reality
CIO Talk Network
 
3 Steps to Better IT-Business Alignment
3 Steps to Better IT-Business Alignment3 Steps to Better IT-Business Alignment
3 Steps to Better IT-Business Alignment
CIO Talk Network
 
IT Integration Strategy
IT Integration StrategyIT Integration Strategy
IT Integration Strategy
CIO Talk Network
 
Act Global think Local
Act Global think LocalAct Global think Local
Act Global think Local
CIO Talk Network
 
The Sixth Sense of Leadership
The Sixth Sense of LeadershipThe Sixth Sense of Leadership
The Sixth Sense of Leadership
CIO Talk Network
 

More from CIO Talk Network (18)

CIO Professional Network
CIO Professional NetworkCIO Professional Network
CIO Professional Network
 
Going Global Think Local
Going Global Think LocalGoing Global Think Local
Going Global Think Local
 
Mergers and Acquisitions IT Integration Plan
Mergers and Acquisitions IT Integration PlanMergers and Acquisitions IT Integration Plan
Mergers and Acquisitions IT Integration Plan
 
BI Governance Framework
BI Governance FrameworkBI Governance Framework
BI Governance Framework
 
Best Technology Podcasts by IT Leaders
Best Technology Podcasts by IT LeadersBest Technology Podcasts by IT Leaders
Best Technology Podcasts by IT Leaders
 
Managing Relationships, Politics and Image
Managing Relationships, Politics and ImageManaging Relationships, Politics and Image
Managing Relationships, Politics and Image
 
Digital-Enabled Wealth Management
Digital-Enabled Wealth ManagementDigital-Enabled Wealth Management
Digital-Enabled Wealth Management
 
Cloud Computing Podcast
Cloud Computing PodcastCloud Computing Podcast
Cloud Computing Podcast
 
IT and Technology Challenges in the Retail Industry
IT and Technology Challenges in the Retail IndustryIT and Technology Challenges in the Retail Industry
IT and Technology Challenges in the Retail Industry
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
Would you Recommend Our Company to Your Friends
Would you Recommend Our Company to Your FriendsWould you Recommend Our Company to Your Friends
Would you Recommend Our Company to Your Friends
 
What is Digital Twin Technology
What is Digital Twin TechnologyWhat is Digital Twin Technology
What is Digital Twin Technology
 
CIO Talk Network Contributors.pdf
CIO Talk Network Contributors.pdfCIO Talk Network Contributors.pdf
CIO Talk Network Contributors.pdf
 
BI Governance_ Making it a Reality
BI Governance_ Making it a RealityBI Governance_ Making it a Reality
BI Governance_ Making it a Reality
 
3 Steps to Better IT-Business Alignment
3 Steps to Better IT-Business Alignment3 Steps to Better IT-Business Alignment
3 Steps to Better IT-Business Alignment
 
IT Integration Strategy
IT Integration StrategyIT Integration Strategy
IT Integration Strategy
 
Act Global think Local
Act Global think LocalAct Global think Local
Act Global think Local
 
The Sixth Sense of Leadership
The Sixth Sense of LeadershipThe Sixth Sense of Leadership
The Sixth Sense of Leadership
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

What is CIS Benchmark

  • 1. What is your Security Score? Cybersecurity is one of the top challenges that faces every company. Fortunately, companies do not have to create their own security program and instead can use a security framework to jump-start the process. A framework documents security standards (benchmarks) and processes that help companies define policies and procedures to implement and manage information security controls. For more information please visit https://www.ciotalknetwork.com/what-is-your-security-score/ The challenge for companies is that there are many security frameworks and the myriad of available technology causes confusion that leads to inaction. The Center for Internet Security, Inc. (CIS®) describes the current situation: But all of this technology, information, and oversight has become a veritable ‘Fog of More’ — competing options, priorities, opinions, and claims that can paralyze or distract an enterprise from vital action.
  • 2. What is CIS Benchmarks? CIS Controls® and CIS Benchmarks tools for companies to assess their security posture. CIS® “is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.” They created a global security standard and best practices to secure systems and information against “the most pervasive attacks”. CIS® defines a prioritized list of 20 best practices (i.e., security controls) that help organizations improve cyber defenses. Further they group them into three implementation groups that are relevant for small, medium and large companies. This flexibility is necessary because small and medium companies cannot necessarily afford the costs to implement all possible security controls at the highest level of maturity and automation. At Encore Electric, Inc., we used the free CIS Controls® Self-Assessment Tool (CSAT) to benchmark our current security posture. We settled on this tool for a couple of reasons. First, we wanted to benchmark our security posture with a numeric score that is simple to understand and communicate to colleagues who have limited knowledge and experience with information security. Second, we wanted a way to demonstrate our level of compliance with particular security frameworks. The CSAT cross-references to other security frameworks such as PCI DSS and NIST 800. For each of the CIS controls, the CSAT measures the maturity against 4 levels: policy defined, control implemented, control reported and control automated. Each level of maturity adds points to an overall score for the CIS benchmarks. The total score ranges from 0 to 100. The tool maps your responses across the 20 controls, compares with averages and industry-specific data, and offers simple reports to communicate the status and results. Once we completed the benchmark, we now can make decisions on improving our security posture. We appreciate that CIS® offers consensus-based benchmarks and controls and objective global standards to better protect our information assets.