-
Decoding the CIS Controls - 17 January 2024
Decoding the CIS Controls- UGA CyberArch Webinar - University of Georgia Kaltura
Josh Franklin, a representative from the Center for Internet Security, a collaborative agency supported by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) at the U.S. Department of Homeland Security discusses general information regarding the CIS Security Controls v8.0, how these controls relate to cybersecurity and how they can best be used within an organization to strengthen cybersecurity.
2. CIS Controls 1.0 and 2.0: Mastering Asset Controls in Hardware and Software
Security Synergy: Mastering Asset Controls in Hardware and Software Webinar- 02/21/2024 - University of Georgia Kaltura (uga.edu)
Our expert speakers, Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS),
and Sarah Day, Senior Cybersecurity Controls Engineer for the Center for Internet Security (CIS), break
down the importance of CIS Control 1 (Inventory and Control of Enterprise Assets) and Control 2
(Inventory and Control of Software Assets). They discuss how Controls 1 and 2 provide a robust
foundation for cybersecurity by establishing visibility and control over your IT assets.
You can subscribe to our channel on the UGA Kaltura platform here, to access these webinars and additional training videos, as well as receive notifications when new content is posted:
https://kaltura.uga.edu/channel/UGA+CyberArch/322781462/subscribe
Upcoming Webinars
-
Stay Secure: Elevating Your Data Protection
Wednesday, Mar. 20, 2024 | 11 a.m. - noon
Register -
Navigating Secure Configurations: Shielding Software and Enterprise Assets
Wednesday, Apr 17, 2024 | 11 a.m. - noon
Register -
Strategic Cyber Resilience: Secure Configurations and Log Management
Wednesday, May 15, 2024 | 11 a.m. - noon
Register -
Uncovering Risks: The Power of Continuous Vulnerability Management
Wednesday, Jun 19, 2024 | 11 a.m. - noon
Register -
Fortifying Digital Gates: Email and Browser Defense Strategies
Wednesday, Jul 17, 2024 | 11 a.m. - noon
Register -
Strengthening Your Digital Perimeter: Strategies Against Malware Threats
Wednesday, Aug 21, 2024 | 11 a.m. - noon
Register -
Unlocking Lost Data: Strategies for Successful Data Recovery
Wednesday, Sep 18, 2024 | 11 a.m. - noon
Register -
The Human Firewall: Enhancing Security through Awareness Training
Wednesday, Oct 16, 2024 | 11 a.m. - noon
Register -
From Crisis to Control: Optimizing Incident Response
Wednesday, Nov 13, 2024 | 11 a.m. - noon
Register -
Closing the Cybersecurity Loop: A Comprehensive CIS Controls Overview
Wednesday, Dec 11, 2024 | 11 a.m. - noon
Register