Jeremiah Bristow Senior Vice President Enterprise Risk and Security Agenda Disclaimer 20 Questions for ITSecurity Based on the 20 CIS Controls Inventory of Authorized Devices on the Network ID: 676038
Download Presentation The PPT/PDF document "Cyber Risk: What You Should Be Asking IT" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Cyber Risk: What You Should Be Asking IT
Jeremiah Bristow
Senior Vice President – Enterprise Risk and SecuritySlide2
AgendaSlide3
DisclaimerSlide4
20 Questions for IT/Security
Based on the 20 CIS ControlsSlide5
Inventory of Authorized Devices on the NetworkSlide6
Inventory of Authorized and Unauthorized SoftwareSlide7
Secure ConfigurationsSlide8
Continuous Vulnerability Assessment / RemediationSlide9
Control Use of Admin PrivilegesSlide10
Audit LoggingSlide11
Email and Web Browser ProtectionSlide12
Malware DefensesSlide13
Limitation of Ports / Protocols / ServicesSlide14
Data RecoverySlide15
Secure Configurations for network (remove?)Slide16
Boundary DefenseSlide17
Data ProtectionSlide18
Controlled Access Based on Need to KnowSlide19
Wireless Access ControlSlide20
Account Monitoring and ControlSlide21
Security Skills Assessment / TrainingSlide22
Application Software SecuritySlide23
Incident Response and ManagementSlide24
Penetration Tests and Red Team ExercisesSlide25
Recommendations / ResourcesSlide26
Recommendations / ResourcesSlide27
RecommendationsSlide28
515-326-5671
jbristow@shazam.net