Achieving Effective Cyber Hygiene with CIS Critical Security Controls 1-5

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Webinar: January 18, 2017 2:00pm EST Register Here

Foundational security controls are shared by many prominent security frameworks – and are an important starting point for achieving cybersecurity effectiveness and efficiency. While this is widely recognized, a recent survey sponsored by Tenable and the Center for Internet Security (CIS) suggests adoption of foundational controls, specifically the CIS Critical Security Controls 1 – 5, remains challenging for many organizations.

To help you realize the benefits of adopting the foundational CIS controls, join Tony Sager, Senior VP and Chief Evangelist, CIS, and Ted Gary, Sr. Product Marketing Manager, Tenable Network Security at 2pm ET on January 18, 2017 for Achieving Effective Cyber Hygiene with Critical Controls 1-5. This webinar will cover the following topics:

Brief review of the latest survey findings on foundational control adoptionQuantitative and qualitative benefits of foundational control adoptionAdoption barriers and best-practices for SMB, mid-market and enterprise organizationsAdvice for front line INFOSEC practitioners and leadersAnswers to your specific questions during live Q&A

Formerly known as the SANS Top 20, the CIS Controls are built upon a set of five foundational controls that are fundamental to leading security frameworks and required for effective cyber hygiene. Learn how you can make them work for your organization. Register for this webinar now.

Speakers:Ted Gary

Product Marketing Manager, Tenable

Tony Sager

Senior VP and Chief Evangelist, CIS

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?