The CIS 20 Organizational Controls – Controls 17-20 Explained
Controls 17-20 — CIS 20 Part Three – The “Organizational” Controls As we suggested in the first two blog posts of our CIS 20 blog post series, the first steps in your cybersecurity approach require developing and implementing technical tools to
The CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap for their cybersecurity defense. Piecemeal or fragmented defense strategies, in response to the latest cyberthreat, leave gaps for attacker exploitation. The Center for Internet Security
6 Steps to Create a Program to Meet CCPA & GDPR Compliance Requirements
A 6-Step Guide to Creating a Privacy and Compliance Program CCPA, GDPR and the coming second wave of new, stricter co mpliance regulations being put in place globally is resulting in higher costs and IT disruption across organizations regardless of industry. We
How Companies Use CIS 20 to Secure Remote Workers
Using CIS Controls 1-6 to Secure Your Remote Employees As we in the industry have documented consistently, Cyber-attacks continue to grow in sophistication and damage particularly over the past several months. For example, we previously wrote about the Industrial Control System