Most cybersecurity professionals know the CIS Top Five Critical Security Controls. Yet, the evidence that they are effective is slim. Using data on cyber-incidents, researchers looked at the attack paths used by adversaries and determined what controls could have disrupted these attack paths. The result is a new set of critical controls that organizations should implement on a priority basis.
Learning Objectives:
1: Understand evidence-based approach to selecting controls.
2: Understand why the “new top five” controls were selected.
3: Chart a pathway to implementing the new top five controls.
Speaker: Todd Inskeep
Todd Inskeep has over 30 years of security leadership experience. He focuses on applying innovative security concepts to solving business problems, building solutions that bridge technology and business. His broad experience includes work with two clients as interim CISO, developing a strategy, policies and program for improving the clients’ cybersecurity maturity. He has led information/cybersecurity program assessments across multiple industries and developed strategies and roadmaps to improve their security maturity, then supporting transformation activities. He has both technology and business leadership along with patented innovations. Inskeep started his career within the US Intelligence Community and holds both a BSEE and a master of science in strategic intelligence.
Detailed Presentation:
Comments