| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
All security programs are not created equal, however, as professionals we need some type of general guidelines and foundational items to focus on. We will talk about transforming all of those wacky and wild security programs using the CIS Controls Version 7 (previously known as the Critical Controls), specifically focusing on how the Controls and Sub-Controls are organized and implemented. Both technical and management methods will be covered so a security team of any size can tackle and tame a wacky and wild security program with the CIS Controls.
Jeremy works at a local government facilities as the Information Security Officer directing the Security and Research Department and is co-founder of CodeRed LLC that focuses on Cyber Security, Application Development, and Leadership. He has been on the Northeast Ohio InfraGard executive board and currently IT Sector Chief. He also serves as Co-Chair for workgroups within the Center of Internet Security (CIS) and works on threat data projects for various entities. He previously worked in Risk Management and Security in Fortune 500 companies. He has presented and involved at various conferences and organizations throughout the nation. On his spare time, he enjoys conducting research on the evolution of security convergence, drones, weapon systems, and scuba diving.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast