Actionable Safeguards: Protecting Your Organization from Access Control Gaps, Misconfigurations, and Outdated Software
Blueprint for Ransomware Defense Webinar Series | Karen Evans, Josh Franklin, Shehzad Mirza, and Brian Cute
EVENT DESCRIPTION
Now that you’ve inventoried your assets and built a strong foundation for protecting your devices, network, and people, it’s time to add the next layer of Safeguards. What are the recommended actionable Safeguards to block a ransomware attack and how can they be implemented?
On November 9, 2022, Karen Evans (Cyber Readiness Institute), Josh Franklin (CIS), Shehzad Mirza (CyberWA), and Brian Cute (GCA) discussed the set of practices an enterprise must implement in order to effectively manage devices and the people who use them.