-
Decoding the CIS Controls - 17 January 2024
Decoding the CIS Controls- UGA CyberArch Webinar - University of Georgia Kaltura
Josh Franklin, a representative from the Center for Internet Security, a collaborative agency supported by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) at the U.S. Department of Homeland Security discusses general information regarding the CIS Security Controls v8.0, how these controls relate to cybersecurity and how they can best be used within an organization to strengthen cybersecurity.
2. CIS Controls 1.0 and 2.0: Mastering Asset Controls in Hardware and Software
Security Synergy: Mastering Asset Controls in Hardware and Software Webinar- 02/21/2024 - University of Georgia Kaltura (uga.edu)
Our expert speakers, Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS),
and Sarah Day, Senior Cybersecurity Controls Engineer for the Center for Internet Security (CIS), break
down the importance of CIS Control 1 (Inventory and Control of Enterprise Assets) and Control 2
(Inventory and Control of Software Assets). They discuss how Controls 1 and 2 provide a robust
foundation for cybersecurity by establishing visibility and control over your IT assets.
3. Stay Secure: Elevating Your Data Protection
Stay Secure: Elevating Your Data Protection- CyberArch Webinar- 3/20/2024 - University of Georgia Kaltura (uga.edu)
Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS),
delves into the critical significance of CIS Control 3 (Data Protection). He elaborates on how Control 3
ensures the safeguarding of sensitive data through measures such as encryption, access controls, and
data handling protocols. Joshua emphasizes how implementing Control 3 forms an integral part of a
comprehensive cybersecurity strategy, fortifying defenses against data breaches and unauthorized
access.
4. Navigating Secure Configurations: Shielding Software and Enterprise Assets
Navigating Secure Configurations: Shielding Software and Enterprise Assets CyberArch Webinar - 17 Apr 2024 - University of Georgia Kaltura (uga.edu)
Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS),
delves into the critical significance of CIS Control 4 (Secure Configuration of Enterprise Assets and
Software). He emphasizes enhancing your organization's security posture through effective
management of firewalls, session locking, and default accounts, minimizing vulnerabilities, and
fortifying access controls. Implementing Control 4 forms an integral part of a comprehensive
cybersecurity strategy, reducing the risk of security breaches and potential attack surfaces.
5. Securing Digital Assets: Account & Access Control Best Practices
Securing Digital Assets: Account & Access Control Best Practices Webinar - 15 May 2024 - University of Georgia Kaltura (uga.edu)
Our expert speaker Sarah Day, Senior Cybersecurity Controls Engineer for the Center for Internet
Security (CIS), delves into the critical significance of CIS Control 5 (Account Management) and CIS
Control 6 (Access Control Management). She explores the best practices for creating, managing and
securing user accounts while implementing strong password policies and multi-factor authentication
to ensure only authorized access. Sarah also dives into the importance of defining and enforcing
access control policies, implementing role-based access controls (RBAC) and monitoring user access
to protect an organization's sensitive data and mitigate the risk of insider threats.
You can subscribe to our channel on the UGA Kaltura platform here, to access these webinars and additional training videos, as well as receive notifications when new content is posted:
https://kaltura.uga.edu/channel/UGA+CyberArch/322781462/subscribe
Upcoming Webinars
-
Uncovering Risks: The Power of Continuous Vulnerability Management
Wednesday, Jun 18, 2024 | 11 a.m. - noon
Register -
Fortifying Digital Gates: Email and Browser Defense Strategies
Wednesday, Jul 17, 2024 | 11 a.m. - noon
Register -
Strengthening Your Digital Perimeter: Strategies Against Malware Threats
Wednesday, Aug 21, 2024 | 11 a.m. - noon
Register -
Unlocking Lost Data: Strategies for Successful Data Recovery
Wednesday, Sep 18, 2024 | 11 a.m. - noon
Register -
The Human Firewall: Enhancing Security through Awareness Training
Wednesday, Oct 16, 2024 | 11 a.m. - noon
Register -
From Crisis to Control: Optimizing Incident Response
Wednesday, Nov 13, 2024 | 11 a.m. - noon
Register -
Closing the Cybersecurity Loop: A Comprehensive CIS Controls Overview
Wednesday, Dec 11, 2024 | 11 a.m. - noon
Register