Skip to Content
Cybersecurity Blue Team Toolkit
book

Cybersecurity Blue Team Toolkit

by Nadean H. Tanner
April 2019
Beginner to intermediate
288 pages
7h 20m
English
Wiley
Content preview from Cybersecurity Blue Team Toolkit

CHAPTER 15CISv7 Controls and Best Practices

WHAT YOU WILL LEARN IN THIS CHAPTER:

  • CIS Basic Controls—The Top Six

As an educator, I firmly believe that humans have to know the “why” to accept change. Most of us are curious creatures of habit and do not change unless sufficiently motivated. Most of us are motivated by either the love of something or the fear of it. In our cyber society, people need to know why certain controls are important, and they have to understand why they are important on a personal level. Knowing something and understanding it are very different. As a cybersecurity trainer, it is my personal mission to educate the public and bring understanding to cyber threats in a personal way. I believe we have to hope for the best but prepare for the worst.

When you are evaluating and auditing your environment for managing your processes and systems, you should determine whether the options you are following are the best practices of conducting inventories, adopting computer policy, and communicating to the people using those systems. You also have to evaluate whether people in the management roles have the practical and technical expertise to assess these options and can provide support and training for users.

The Center for Internet Security (CIS) is a self‐described forward‐thinking, nonprofit entity dedicated to protecting private domains and public society against cyber threats. The controls they publish are the global standard and are the recognized best practices ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity Attacks- Red Team Strategies

Cybersecurity Attacks- Red Team Strategies

Johann Rehberger

Publisher Resources

ISBN: 9781119552932Purchase book