Fred Cobb – CISO and VP of Services, InfoSystems
Rob Ashcraft – Sr. Cyber Security Strategist, InfoSystems
This episode of the Cybersecurity Weekly Podcast is Part 11 of our series on the Center for Internet Security Top 20 Controls. Here's a quick list of where we're at:
Basic CIS Controls 1-6Foundational CIS Controls
7) Email and Web Browser Protections
8) Malware Defenses
9) Limitation and Control of Network Ports, Protocols, and Services
10) Data Recovery Capability
11) Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
In this episode, Fred and Rob discuss how you can secure network devices. This is the fourth Foundational CIS Control and is used to secure the configuration for network devices such as Firewalls, Routers, and Switches. Secure configuration for network devices is most impactful when a company has taken action against the first ten CIS Controls (following the CIS Top 20 Cybersecurity Controls).
Firewalls are what sit between you and the internet. So it makes sense that cyber criminals aim their attacks at these devices. But these aren't the only devices they aim to gain control of. Other network devices such as Routers and Switches are on the list. When these devices are poorly managed, they're vulnerable. This episode aims to educate you on how you can rigorously manage these devices and change control processes. These management and change control processes help prevent attackers from exploiting your vulnerable services and settings.
You can implement these controls yourself, but it may cost you a substantial amount of time, money, and effort. There are Cybersecurity experts who specialize in getting these controls set up for hundreds of organizations.
Listen to the full episode to learn how your business can begin following the Center for Internet Security Top 20 Controls and make your company more secure.More Information
We'd love to hear your feedback. If you have any questions, you can text us at 423-697-9528 or email firstname.lastname@example.org.
This episode discusses Control Eleven of the CIS (Center for Internet Security) "Top 20 Controls." The Top 20 Controls are a set of prioritized best practices designed to help organizations protect themselves from cyber-attacks. It is a framework for every organization, whether you have a full department of IT support or don't have security programs or measures in place. You can learn more about the 20 CIS Controls here.
See the break-down of these CIS Controls' Sub-Controls here.
Discover how other organizations are using these controls here.