Cybersecurity Weekly - Season 1, Episode 19
Cyber Ops Unmasked
English - May 11, 2020 16:37 - 15 minutes - 12.3 MBBusiness Technology infosystems tennessee cybersecurity fredcobb informationtechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Cybersecurity Weekly - Season 1, Episode 18
Next Episode: Cybersecurity Weekly - Season 1, Episode 20
In this episode, Fred and Rob discuss how to establish, implement, and manage security arrangements of hardware and software on devices. This helps prevent cyber attackers from getting control of vulnerable settings and services. The secure configuration for hardware and software is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, and has Controlled Use of Administrative Privileges (following the CIS Top 20 Cybersecurity Controls).