Ranked #1
CIS Control 12 - Network Infrastructure Management - sponsored by Domotz!
CIS Control 12 - Network Infrastructure Management - sponsored by Domotz!
Abstract: Network Infrastructure Management - Establish, implement, and actively manage network devices, in order to pre... Read more
7 Jul 2022
•
57mins
Ranked #2
CIS Control 11 - Data Recovery - sponsored by Datto!
CIS Control 11 - Data Recovery - sponsored by Datto!
Abstract: Data loss can be a consequence of a variety of factors from malicious ransomware, threat actors using "Double ... Read more
24 May 2022
•
1hr 4mins
Ranked #3
CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!
CIS Control 10 - Malware Defenses - sponsored by Malwarebytes!
Abstract: With the continuing rise of ransomware, malware defenses are more critical than ever before with regard to sec... Read more
26 Apr 2022
•
48mins
Ranked #4
CIS Control 9 - Email & Web Browser Protections - sponsored by Cisco Secure MSP
CIS Control 9 - Email & Web Browser Protections - sponsored by Cisco Secure MSP
Abstract: Web browsers and email clients are very common points of entry for attackers because of their direct interacti... Read more
17 Mar 2022
•
56mins
Ranked #5
CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber
CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber
Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly. S... Read more
12 Feb 2022
•
59mins
Ranked #6
CIS Control 7 - Continuous Vulnerability Management - sponsored by CyberCNS
CIS Control 7 - Continuous Vulnerability Management - sponsored by CyberCNS
Note we discuss Log4j as this is a very timely topic to this control. Abstract: Cyber defenders are constantly being cha... Read more
22 Dec 2021
•
54mins
Ranked #7
CIS Control 6 - Access Control Management - sponsored by Appgate
CIS Control 6 - Access Control Management - sponsored by Appgate
Abstract: It is easier for an external or internal threat actor to gain unauthorized access to assets or data through us... Read more
23 Nov 2021
•
52mins
Ranked #8
CIS Control 5 - Account Management - sponsored by Keeper Security
CIS Control 5 - Account Management - sponsored by Keeper Security
Abstract: There are many ways to covertly obtain access to user accounts, including: week passwords, accounts still vali... Read more
19 Oct 2021
•
1hr 4mins
Ranked #9
Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker
Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker
Abstract: Learn why the number one thing organizations can do to defend their networks against top attacks, is to imple... Read more
26 Aug 2021
•
45mins
Ranked #10
Control 3: Data Protection (part 2) - Sponsored by Datto
Control 3: Data Protection (part 2) - Sponsored by Datto
Abstract: CIS Control 3 is Data Protection and data is pretty much what's at stake for a high percentage of cyber attack... Read more
9 Jul 2021
•
31mins