Due to technical issues a recording of this webinar is not currently available. Please check back soon.
When the next step to becoming secure seems ambiguous, a framework can give you the confidence to move forward with clarity. Serving as a guide, it will highlight the gaps in your security program and offer a baseline of controls that you can prioritize.
Being compliant doesn’t automatically equate to being secure, but you can use compliance frameworks as a checklist to ensure that you’ve implemented the most effective security controls.
Which framework aligns with your organization’s current tech stack and future goals?
We’ll give you practical guidance to choose one that’s best for you and use it as a checklist to achieve your most important security benchmarks.
In this webinar, you’ll learn:
- The major differences between NIST and CIS, plus pros and cons of each
- Which controls to prioritize when you don’t have time for all of them
- How to approach using a framework realistically, with goals that small teams can easily achieve
This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
Wolfgang Goerlich, Advisory CISO, Duo Security
Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.
Mike Toole, Head of Security and IT, Blumira
Mike, Head of Security and IT at Blumira, has over a decade of experience in IT. Prior to joining Blumira, he managed IT for Duo Security and Censys. He has broad experience with a range of IT and security focus areas, including compliance, network design, log monitoring, project management, and cross-platform IT.