Video: Center for Internet Security (CIS) Controls

In this lesson, Nick Palazzolo, CPA, dives into the comprehensive set of best practices outlined by the Center for Internet Security to safeguard organizations from prevalent cyber threats. He methodically walks through various controls such as inventory and control of both hardware and software assets, continuous vulnerability management, and secure configuration for mobile and stationary devices. Each control is explained in detail to ensure thorough understanding of how proper implementation can fortify an organization's network. Nick emphasizes the importance of administrative privileges management, audit log analysis, and protections for email and web browsing to prevent unauthorized access and cyber attacks. Additionally, he covers advanced topics like malware defense, network port management, and data recovery strategies to enhance organizational resilience against sophisticated threats. By the end of the lesson, the robustness of the CIS controls is highlighted, providing a strong framework for cybersecurity compliance and protection.

Create an account Get started free. No credit card required.
Regulations, Standards and Frameworks
Module: 3 Concepts, 41 Videos
Monitoring
1:27