SlideShare a Scribd company logo
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Tony Sager is a Senior Vice President and Chief Evangelist for CIS
(The Center for Internet Security). In this role, he leads the
development of the CIS Controls, a worldwide consensus project
to find and support technical best practices in cybersecurity.
Sager also serves as the Director of the SANS Innovation Center,
a subsidiary of The SANS Institute.
Maurice Uenuma – Strategic Account Manager, Tripwire
Prior to joining Tripwire, he was Vice President at the Center for
Internet Security (CIS), and currently serves as Workforce
Management co-chair of the National Initiative for
Cybersecurity Education (NICE) Working Group at NIST.
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
A Cyberdefense OODA Loop
(“patch Tuesday”)
OBSERVE
Track security bulletins,
advisories
ORIENT
Assess applicability,
operational issues, risk
DECIDE
Prioritize remediation
ACT
Rollout, Monitor, Manage
“breakage”
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
The CIS Controls™️
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
• Website: www.cisecurity.org
• Email: Controlsinfo@cisecurity.org
• Twitter: @CISecurity
• Facebook: Center for Internet Security
• LinkedIn Groups:
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
The CIS Controls
Q & A with Tony Sager
tripwire.com | @TripwireInc
www.cisecurity.org
www.tripwire.com

More Related Content

PDF
Top influential women cybersecurity
PPTX
Why information security is becoming the most important for mid size business...
PDF
How to handle multilayered IT security today
PDF
Cyber Security Challenges: how are we facing them?
PDF
Canarie kathryn anthonisen 16 9 rev
PDF
Cyber Security Challenges and Strategies
PDF
IGPC Data Breach Planning braindump
PDF
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Top influential women cybersecurity
Why information security is becoming the most important for mid size business...
How to handle multilayered IT security today
Cyber Security Challenges: how are we facing them?
Canarie kathryn anthonisen 16 9 rev
Cyber Security Challenges and Strategies
IGPC Data Breach Planning braindump
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team

What's hot (20)

PPTX
MyConcern - Safeguarding in education
PDF
The view of auditor on cybercrime
PPTX
HackerOne, Security Meetup 4 декабря 2014, Mail.Ru Group
PPTX
SAMBA - Luka Pavol - 12.3.2014
PPTX
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
ODP
Cyber Security & User's Privacy Invasion
PDF
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
PPTX
Global Thought Leadership Webcast, March 23
PPTX
Modern Security the way Equifax Should Have
PPTX
How Silicon Valley startups are approaching security differently
DOCX
letter of recommendation
PDF
Machine Learning implications in Security
PPT
Network Security Monitoring or How to mitigate a DDoS attack in 20'
PDF
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
PPTX
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
PPTX
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
PDF
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
PPTX
The 7 Essentials for Cyber Security
PDF
A10 presentation overcoming the industrys insecurity complex
PDF
International Journal of Network Security & Its Applications (IJNSA)
MyConcern - Safeguarding in education
The view of auditor on cybercrime
HackerOne, Security Meetup 4 декабря 2014, Mail.Ru Group
SAMBA - Luka Pavol - 12.3.2014
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
Cyber Security & User's Privacy Invasion
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
Global Thought Leadership Webcast, March 23
Modern Security the way Equifax Should Have
How Silicon Valley startups are approaching security differently
letter of recommendation
Machine Learning implications in Security
Network Security Monitoring or How to mitigate a DDoS attack in 20'
ITAM AUS 2017 Harnessing the power of SAM Intelligence for Cyber Security
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Don’t WannaCry? Here’s How to Stop Those Ransomware Blues
The 7 Essentials for Cyber Security
A10 presentation overcoming the industrys insecurity complex
International Journal of Network Security & Its Applications (IJNSA)
Ad

Similar to Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 (20)

PDF
CIS_Controls_v7.1_Implementation_Groups.pdf
PDF
CA_Module_2.pdf
PDF
ICS Cyber Security Effectiveness Measurement
PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
PDF
CYBER-i Corporate Dossier
PDF
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
PDF
Cyber Security in Railways Systems, Ansaldo STS experience
PDF
Understanding Cyber Kill Chain and OODA loop
PDF
CIS20 CSCs+mapping to NIST+ISO.pdf
PDF
Cs cmaster
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
PPT
CS_Tuto.ppt
PDF
TI Safe ICS Cybersecurity Training
PPTX
CSE_Instructor_Materials22222222222222_Chapter8.pptx
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PDF
CIA Trifecta ISACA Boise 2016 Watson
PDF
The Next Generation Security
PDF
Mich_Cyber_Initiative_2015
PDF
Cyber Security Strategies and Approaches
PDF
Industrial Control Security USA Sacramento California Oct 6/7
CIS_Controls_v7.1_Implementation_Groups.pdf
CA_Module_2.pdf
ICS Cyber Security Effectiveness Measurement
(Ebook) CIS Critical Security Controls by Center for Internet Security
CYBER-i Corporate Dossier
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Cyber Security in Railways Systems, Ansaldo STS experience
Understanding Cyber Kill Chain and OODA loop
CIS20 CSCs+mapping to NIST+ISO.pdf
Cs cmaster
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
CS_Tuto.ppt
TI Safe ICS Cybersecurity Training
CSE_Instructor_Materials22222222222222_Chapter8.pptx
Top 20 Security Controls for a More Secure Infrastructure
CIA Trifecta ISACA Boise 2016 Watson
The Next Generation Security
Mich_Cyber_Initiative_2015
Cyber Security Strategies and Approaches
Industrial Control Security USA Sacramento California Oct 6/7
Ad

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group: TIV Demo
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Keynote w/Patrick Miller
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Tartificialntelligence_presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
Machine Learning_overview_presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Mushroom cultivation and it's methods.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
Advanced methodologies resolving dimensionality complications for autism neur...
Tartificialntelligence_presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding

Jumpstarting Your Cyberdefense Machine with the CIS Controls V7

  • 2. Tony Sager is a Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security). In this role, he leads the development of the CIS Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Sager also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. Maurice Uenuma – Strategic Account Manager, Tripwire Prior to joining Tripwire, he was Vice President at the Center for Internet Security (CIS), and currently serves as Workforce Management co-chair of the National Initiative for Cybersecurity Education (NICE) Working Group at NIST.
  • 4. A Cyberdefense OODA Loop (“patch Tuesday”) OBSERVE Track security bulletins, advisories ORIENT Assess applicability, operational issues, risk DECIDE Prioritize remediation ACT Rollout, Monitor, Manage “breakage”
  • 9. • Website: www.cisecurity.org • Email: Controlsinfo@cisecurity.org • Twitter: @CISecurity • Facebook: Center for Internet Security • LinkedIn Groups:
  • 12. The CIS Controls Q & A with Tony Sager