Facebook Google Plus Twitter LinkedIn YouTube RSS Menú Buscar Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Seminario web a petición

Effectively Implement and Monitor CIS Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers

CIS Controls Webinar Series – Session 3 of 5

Are your systems running unneeded services that unnecessarily increase your attack surface?  How are you ensuring conformance with hardening guidelines and industry best practices? And how well are you detecting unusual and unexpected changes?

To get smarter about strengthening system configurations across your enterprise, join us at 2pm ET for our junio 21, 2017 webinar, “Effectively Implement and Monitor CIS Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.”

Hosted by Ted Gary of Tenable, this webinar will be led by guest expert, Brian Ventura, Information Security Architect with the City of Portland and Critical Security Controls instructor for SANS. The session will also feature a brief demonstration of Tenable SecurityCenter Continuous View®.

By attending this webinar you will gain:

  • Expert advice, guidance and best practices for implementing and monitoring conformance with CIS Control 3.
  • Insight into how Tenable automates and supports effective control adoption
  • Answers to your questions and comments during a live Q&A session

Reserve your spot, register today.

[Please note: we have updated the name of this webinar to reflect the Center for Internet Security's decision to rebrand the 20 Critical Security Controls as the CIS Controls.]

Speakers:

Brian Ventura

Critical Security Controls Instructor, SANS and Information Security Architect, City of Portland

Steve McGrath

Product Specialist, Tenable

Ted Gary

Sr. Product Marketing Manager, Tenable

Ver ahora