SEC566: Implementing and Auditing the Critical Security Controls – In-Depth
SEC566 [ PDF= 2016 ]
In the last couple of years it has become obvious that in the world of information security, the offense is outperforming the defense. Even though budgets increase and management pays more attention to the risks of data loss and system penetration, data is still being lost and systems are still being penetrated. Over and over people are asking, “What can we practically do to protect our information?” The answer has come in the form of 20 information assurance controls known as the Consensus Audit Guidelines (CAG).
SEC566.1: Introduction and Overview of the 20 Critical Controls
SEC566.2: Critical Controls 3, 4, 5 and 6
SEC566.3: Critical Controls 7, 8, 9, 10 and 11
SEC566.4: Critical Controls 12, 13, 14 and 15
SEC566.5: Critical Controls 16, 17, 18, 19 and 20