Effectively Implement and Monitor CIS Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
CIS Controls Webinar Series – Session 3 of 5
Are your systems running unneeded services that unnecessarily increase your attack surface? How are you ensuring conformance with hardening guidelines and industry best practices?And how well are you detecting unusual and unexpected changes?
To get smarter about strengthening system configurations across your enterprise, join us at 2pm ET for our 6月 21, 2017 webinar, “Effectively Implement and Monitor CIS Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.”
Hosted by Ted Gary of Tenable, this webinar will be led by guest expert, Brian Ventura, Information Security Architect with the City of Portland and Critical Security Controls instructor for SANS.The session will also feature a brief demonstration of Tenable SecurityCenter Continuous View®.
By attending this webinar you will gain:
- Expert advice, guidance and best practices for implementing and monitoring conformance with CIS Control 3.
- Insight into how Tenable automates and supports effective control adoption
- Answers to your questions and comments during a live Q&A session
Reserve your spot, register today.
[Please note: we have updated the name of this webinar to reflect the Center for Internet Security's decision to rebrand the 20 Critical Security Controls as the CIS Controls.]