Download presentation
Presentation is loading. Please wait.
Published byMelinda Bennett Modified over 9 years ago
1
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf” Alshakarti @Alshakarti http://secadmins.com
2
#MMSMOA @Alshakarti Cyber Security Advisor MS Ignite 2015 MS TechEd’s 20 Years of Coding, Pentesting, Security & Identity Mgmt Hasain ”The Wolf” Alshakarti Enterprise Security Stockholm, Sweden
3
Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also download slides). One lucky winner will receive a free ticket to the next MMS! Session Title: Discuss… Ask your questions-real world answers! Plenty of time to engage, share knowledge. SPONSORS
4
CSC 1:Inventory of Authorized and Unauthorized Devices Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
5
CSC 2:Inventory of Authorized and Unauthorized Software Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
6
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
7
CSC 4: Continuous Vulnerability Assessment and Remediation Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
8
CSC 5: Controlled Use of Administrative Privileges Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
9
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
10
CSC 7: Email and Web Browser Protections Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
11
CSC 8: Malware Defenses Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
12
CSC 9: Limitation and Control of Network Ports, Protocols, and Services Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
13
CSC 10: Data Recovery Capability Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
14
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
15
CSC 12: Boundary Defense Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
16
CSC 13: Data Protection Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
17
CSC 14: Controlled Access Based on the Need to Know Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
18
CSC 15: Wireless Access Control Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
19
CSC 16: Account Monitoring and Control Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
20
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
21
CSC 18: Application Software Security Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
22
CSC 19: Incident Response and Management Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
23
CSC 20: Penetration Tests and Red Team Exercises Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.