This book introduces the 20 most critical security controls that any organization must implement to defend against modern cyber attacks. It discusses insider and outsider threats, common security standards from the US government, and how to audit controls to ensure they are effective. The document provides details on technical controls for network equipment, laptops, web servers, and more to help organizations implement the 20 critical security controls and protect their data.