The Role of Breach Controls in Network SecurityPhyllis Lee of CIS Discusses Prioritizing Defense Steps
If a breach happens, how can you defend your choice of controls - technical and procedural - to implement to improve your network security?
See Also: Buyer's Guide to Securing Privileged Access
In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Phyllis Lee, senior director of controls at the Center for Internet Security, discusses:
- A preview of Controls Version 8 - what’s new and what’s been dropped;
- What you should do first to control your data;
- How CIS controls fit in with other frameworks.
Prior to joining CIS, Lee worked at the U.S. National Security Agency, focusing on the intersection between malware and virtualization, which included work that led the security automation strategy for the NSA Information Assurance Directorate.