Presentation is loading. Please wait.

Presentation is loading. Please wait.

Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”

Similar presentations


Presentation on theme: "Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”"— Presentation transcript:

1 Critical Security Controls & Effective Cyber Defense Hasain “The Wolf” Alshakarti @Alshakarti http://secadmins.com

2 #MMSMOA @Alshakarti Cyber Security Advisor MS Ignite 2015 MS TechEd’s 20 Years of Coding, Pentesting, Security & Identity Mgmt Hasain ”The Wolf” Alshakarti Enterprise Security Stockholm, Sweden

3 Evaluations: Please provide session feedback by clicking the EVAL button in the scheduler app (also download slides). One lucky winner will receive a free ticket to the next MMS! Session Title: Discuss… Ask your questions-real world answers! Plenty of time to engage, share knowledge. SPONSORS

4 CSC 1:Inventory of Authorized and Unauthorized Devices Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

5 CSC 2:Inventory of Authorized and Unauthorized Software Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

6 CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

7 CSC 4: Continuous Vulnerability Assessment and Remediation Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

8 CSC 5: Controlled Use of Administrative Privileges Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

9 CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

10 CSC 7: Email and Web Browser Protections Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

11 CSC 8: Malware Defenses Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

12 CSC 9: Limitation and Control of Network Ports, Protocols, and Services Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

13 CSC 10: Data Recovery Capability Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

14 CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

15 CSC 12: Boundary Defense Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

16 CSC 13: Data Protection Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

17 CSC 14: Controlled Access Based on the Need to Know Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

18 CSC 15: Wireless Access Control Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

19 CSC 16: Account Monitoring and Control Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

20 CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

21 CSC 18: Application Software Security Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

22 CSC 19: Incident Response and Management Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

23 CSC 20: Penetration Tests and Red Team Exercises Center for Internet Security https://www.cisecurity.org/critical--‐controls.cfm

24


Download ppt "Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”"

Similar presentations


Ads by Google