Due to technical issues, a recording of this webinar is not currently available. Please check back soon.
When the next step to becoming secure seems ambiguous, a framework can give you the confidence to move forward with clarity. Serving as a guide, it will highlight the gaps in your security program and offer a baseline of controls that you can prioritize.
Being compliant doesn’t automatically equate to being secure, but you can use compliance frameworks as a checklist to ensure that you’ve implemented the most effective security controls.
Which framework aligns with your organization’s current tech stack and future goals?
We’ll give you practical guidance to choose one that’s best for you and use it as a checklist to achieve your most important security benchmarks.
In this webinar, you’ll learn:
- The major differences between NIST and CIS, plus pros and cons of each
- Which controls to prioritize when you don’t have time for all of them
- How to approach using a framework realistically, with goals that small teams can easily achieve
This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
When the next step to becoming secure seems ambiguous, a framework can give you the confidence to move forward with clarity. Serving as a guide, it will highlight the gaps in your security program and offer a baseline of controls that you can prioritize. If you're specifically interested in diving deeper, explore our comprehensive NIST Cybersecurity Framework guide.
Participants
Wolfgang Goerlich, Advisory CISO, Duo Security
Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.
Mike Toole, Head of Security and IT, Blumira
Mike, Head of Security and IT at Blumira, has over a decade of experience in IT. Prior to joining Blumira, he managed IT for Duo Security and Censys. He has broad experience with a range of IT and security focus areas, including compliance, network design, log monitoring, project management, and cross-platform IT.
Erica Mixon
Erica is an award-winning writer, editor and journalist with over ten years of experience in the digital publishing industry. She holds a Bachelor’s degree in writing, literature and publishing from Emerson College. Her foray into technology began at TechTarget, where she provided editorial coverage on a wide variety...
More from the blog
View All Posts10/29 - Election-Inspired Incident Response: Lessons from Real-World Scenarios
Read MoreOn Demand - Tabletop Exercises: Improve Your Practice for Better Incident Response
Read MoreOn Demand - How Updated CIS Controls Help Safeguard Public Utilities and Government Agencies
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.