DiscoverCyber Ops UnmaskedCybersecurity Weekly - Season 1, Episode 28
Cybersecurity Weekly - Season 1, Episode 28

Cybersecurity Weekly - Season 1, Episode 28

Update: 2020-07-13
Share

Description

In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Cybersecurity Weekly - Season 1, Episode 28

Cybersecurity Weekly - Season 1, Episode 28

Fred Cobb, CISO - InfoSystems, Chattanooga, TN