Cybersecurity Weekly - Season 1, Episode 28
Cyber Ops Unmasked
English - July 13, 2020 19:06 - 13 minutes - 10.4 MBBusiness Technology infosystems tennessee cybersecurity fredcobb informationtechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Cybersecurity Weekly - Season 1, Episode 27
Next Episode: Cybersecurity Weekly - Season 1, Episode 29
In this episode, Fred and Tim discuss how you can detect, prevent, and correct the way your information is shared between networks. This is the sixth Foundational CIS Control and is used to secure your network perimeter. Boundary Defense is most impactful when a company has taken action against the first eleven CIS Controls (following the CIS Top 20 Cybersecurity Controls).