Preventing Cyber Shutdowns by Implementing CIS Controls
By: Brian Ventura
India’s State Government Datacenter was attacked and infected with malware , shutting down core citizen services. An incident of this size can severely impact large communities! While the IT team knowingly powered off systems, causing services to go offline; powering off systems slowed and stopped the spread of the infection. While this appears not to be a breach, governments, public, and private entities are increasingly facing these severe incidents. The impacts can be devastating. Having a strong, confident information security program has become a requirement. The Center for Internet Security recently updated their CIS Critical Security Controls v8.1, which are focused on removing the most important cyber risks to the organization. In this case, properly implemented CIS Controls would have reduced and possibly avoided the incident. A glimmer of hope for the Uttarakhand government is a promised focus on enhancing CyberSecurity from the Chief Minister.
Comparing the published details around the incident with the CIS Control safeguards, we identify several CIS safeguards that would have prevented or at least detected the malware far earlier in the process, drastically reducing impact to the organization.
Identifying the most important tools and controls to put in place can be challenging with competing messages. Vendors tout products that solve all problem or make the problem they solve sound like the problem most important to solve. Compliance requires certain protections without definitively assuring security. High-level frameworks dictate what must be done at a high-level, requiring translation into specific technologies and solutions. The CIS Controls are designed to address the most common and damaging attacks today and in the future with technical controls. These become a minimum-security state and provide more than 90% protections against the most common and damaging attacks today (including: Malware, Ransomware, Web Application hacking, Insider and Privileged Misuse, Targeted Intrusions). The SEC566 course dives into these preventive measures, equipping cybersecurity leaders with practical skills to implement these foundational controls and protect against such incidents.
- Connect with Brian Ventura , SANS Certified Instructor and Author of SEC566: Implementing and Auditing CIS Controls
Save the Date - Free Webcasts Coming Up!
Understanding the Risk Management Mandates in 2024 Cybersecurity Regulations
Top Three CISO Strategic Issues
领英推荐
Understanding the 2024 Updates to the NIST Cybersecurity Framework (CSF)
Claim Your Free Hour of SEC566
Learn how an organization can defend its information by using a vetted cybersecurity control standard. Students will specifically learn how to implement, manage, and assess security control requirements defined by the Center for Internet Security's (CIS) Controls. Students will gain direct knowledge of the CIS Controls and ecosystem of tools to implement CIS controls across organizations complex networks, including cloud assets.
Operational Cybersecurity Executive Triad
An Operational Cybersecurity Executive will be able to grow and sharpen their cyber defense team, understand and implement critical security controls through a prioritized, risk-based approach, and mature a vulnerability management program by strategically prioritizing vulnerabilities. They can also align SOC efforts to enhance defensive capabilities, drive and communicate improvements, decrease the company's risk profile, and increase ROI on cybersecurity investments. Earn the triad coin by completing SEC566, LDR516, and LDR551. Learn more here.
Cybersecurity Technical & Leadership | MSc | MBA | IEC62443 | CISSP | CCNA | GEVA | GSEC | GCCC | GMON | GRID | GSTRT | GSLC | GCLD | GIAC Advisory
3 周Love this