Effectively Implement and Monitor CIS Control 1 – Inventory of Authorized and Unauthorized Devices
CIS Controls Webinar Series – Session 1 of 5
A proliferation of hardware devices are finding their way into your enterprise.New or unknown devices on your network can greatly increase security risk.Inventorying and managing authorized and unauthorized devices is vital for maintaining a secure environment.Among the Center for Internet Security’s list of 20 prioritized critical controls, this one rises to the top as the first you should implement.
To learn how you can strengthen your security program with CIS Control 1, please join us at 2pm ET on 星期三, 5月 3, 2017 for Effectively Implement and Monitor CIS Control 1 – Inventory of Authorized and Unauthorized Devices.
By attending this webinar you will gain:
- Expert advice, guidance and best practices for implementing and monitoring conformance with CIS Control 1.
- Insight into how Tenable automates and supports effective control adoption.
- Answers to your questions and comments during a live Q&A session.
Hosted by Ted Gary of Tenable, this webinar will be led by guest speaker Brian Ventura, Information Security Architect with the City of Portland and Critical Security Controls instructor for SANS.The session will also feature a brief demonstration of Tenable SecurityCenter Continuous View.
Reserve your spot, register today.
[Please note: we have updated the name of this webinar to reflect the Center for Internet Security's decision to rebrand the 20 Critical Security Controls as the CIS Controls.]