Cybersecurity Where You Are (video)

Episode 165: An In-Depth Look at CIS Controls Implementation


Listen Later

In Episode 165 of Cybersecurity Where You Are, Tony Sager sits down with Valecia Stocchetti, Senior Cybersecurity Engineer at the Center for Internet Security® (CIS®), and Charity Otwell, Director of Critical Security Controls at CIS. Together, they take an in-depth look at implementing the CIS Critical Security Controls® (CIS Controls®), including what you need to know to begin your own CIS Controls implementation efforts.

Here are some highlights from our episode:

  • 00:53. Introductions to Valecia and Charity
  • 02:48. How the CIS Controls ecosystem answers the deeper question of how to implement
  • 06:42. The importance of clear strategy, business priorities, and a realistic timeline
  • 09:56. How the CIS Community Defense Model (CDM) clarifies cyber defense priorities
  • 13:01. The use of calculations around costing to make a security program achievable
  • 15:31. Bringing IT and the Board of Directors together through governance
  • 20:36. "Herding cats" as a metaphor for navigating different compliance frameworks
  • 23:17. Why one prescriptive ask per CIS Safeguard starts cybersecurity workflows
  • 25:30. "Why" vs. "how" communication, accountability, staffing, budget, and continuous improvement as keys to success for CIS Controls implementation
  • 42:03. CIS Controls Assessment Specification as an answer to implementation subjectivity
  • 47:21. Parting thoughts around team effort, change, and CIS Controls Accreditation

Resources

  • Cloud Companion Guide for CIS Controls v8.1
  • CIS Community Defense Model 2.0
  • The Cost of Cyber Defense CIS Controls IG1
  • Episode 132: Day One, Step One, Dollar One for Cybersecurity
  • Policy Templates
  • Episode 107: Continuous Improvement via Secure by Design
  • Reasonable Cybersecurity Guide
  • CIS Controls Resources
  • CIS Controls Assessment Specification
  • Episode 156: How CIS Uses CIS Products and Services
  • CIS Controls Accreditation
  • Controls Accreditation
  • Episode 102: The Sporty Rigor of CIS Controls Accreditation

If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing [email protected].

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Hacked by Hacked

Hacked

190 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

655 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,023 Listeners

Smashing Security by Graham Cluley

Smashing Security

318 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,041 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners