Most cybersecurity professionals know the CIS Top Five Critical Security Controls. Yet, the evidence that they are effective is slim. Using data on cyber-incidents, researchers looked at the attack paths used by adversaries and determined what controls could have disrupted these attack paths. The result is a new set of critical controls that organizations should implement on a priority basis.

Learning Objectives:
1: Understand evidence-based approach to selecting controls.
2: Understand why the “new top five” controls were selected.
3: Chart a pathway to implementing the new top five controls.

Speaker: Todd Inskeep

Todd Inskeep has over 30 years of security leadership experience. He focuses on applying innovative security concepts to solving business problems, building solutions that bridge technology and business. His broad experience includes work with two clients as interim CISO, developing a strategy, policies and program for improving the clients’ cybersecurity maturity. He has led information/cybersecurity program assessments across multiple industries and developed strategies and roadmaps to improve their security maturity, then supporting transformation activities. He has both technology and business leadership along with patented innovations. Inskeep started his career within the US Intelligence Community and holds both a BSEE and a master of science in strategic intelligence.

Detailed Presentation:

(Source: RSA Conference USA 2018)
 
 
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)