The Role of Breach Controls in Network Security
Phyllis Lee of CIS Discusses Prioritizing Defense StepsIf a breach happens, how can you defend your choice of controls - technical and procedural - to implement to improve your network security?
See Also: Keeping Your Side of the Street Clean: 5 Cyber-Hygiene Facts You Wish You Knew Earlier
In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Phyllis Lee, senior director of controls at the Center for Internet Security, discusses:
- A preview of Controls Version 8 - what’s new and what’s been dropped;
- What you should do first to control your data;
- How CIS controls fit in with other frameworks.
Prior to joining CIS, Lee worked at the U.S. National Security Agency, focusing on the intersection between malware and virtualization, which included work that led the security automation strategy for the NSA Information Assurance Directorate.