Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Cyber Security Advisor MS Ignite 2015 MS TechEd’s 20 Years of Coding, Pentesting, Security & Identity Mgmt Hasain ”The Wolf” Alshakarti Enterprise Security Stockholm, Sweden
Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also download slides). One lucky winner will receive a free ticket to the next MMS! Session Title: Discuss… Ask your questions-real world answers! Plenty of time to engage, share knowledge. SPONSORS
CSC 1:Inventory of Authorized and Unauthorized Devices Center for Internet Security
CSC 2:Inventory of Authorized and Unauthorized Software Center for Internet Security
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Center for Internet Security
CSC 4: Continuous Vulnerability Assessment and Remediation Center for Internet Security
CSC 5: Controlled Use of Administrative Privileges Center for Internet Security
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs Center for Internet Security
CSC 7: and Web Browser Protections Center for Internet Security
CSC 8: Malware Defenses Center for Internet Security
CSC 9: Limitation and Control of Network Ports, Protocols, and Services Center for Internet Security
CSC 10: Data Recovery Capability Center for Internet Security
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Center for Internet Security
CSC 12: Boundary Defense Center for Internet Security
CSC 13: Data Protection Center for Internet Security
CSC 14: Controlled Access Based on the Need to Know Center for Internet Security
CSC 15: Wireless Access Control Center for Internet Security
CSC 16: Account Monitoring and Control Center for Internet Security
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps Center for Internet Security
CSC 18: Application Software Security Center for Internet Security
CSC 19: Incident Response and Management Center for Internet Security
CSC 20: Penetration Tests and Red Team Exercises Center for Internet Security