This comprehensive training workshop equips participants with the knowledge and skills necessary to understand and implement the Center for Internet Security (CIS) Critical Security Controls version 8 (CIS Controls v8). Through a blend of interactive lectures, group discussions, practical exercises, and case studies, participants will gain a thorough understanding of the 18 CIS Controls and their associated Safeguards.
The training delves into the core principles and objectives of CIS Controls v8, highlighting their significance in mitigating modern cyber threats. Participants will learn how to prioritize and select relevant controls for their specific organization, integrate them seamlessly into existing security practices, and maintain ongoing monitoring and improvement.
By the end of this training, participants will be able to:
-Gain a deep understanding of the CIS Controls framework.
-Identify and explain the 18 CIS Controls and their associated Safeguards.
-Recognize the importance of implementing CIS Controls in your organization.
-Develop strategies for integrating CIS Controls into existing security practices based on your organization's size and resources.
-Learn best practices for managing and maintaining CIS Controls implementation.
-Identify valuable resources for further exploration of CIS Controls.
-Understand how CIS Controls map to other security frameworks like ISO and NIST.
This training is designed for a broad audience, including:
-IT professionals (system administrators, network security specialists, security analysts)
-Developers and programmers
-Business managers and executives
-Anyone involved in protecting their organization's data and systems
Basic understanding of cybersecurity concepts like firewalls, malware, and user access control.
Module 1: Introduction to CIS Controls v8
Overview of the CIS Controls and its history.
The importance of CIS Controls in a modern threat landscape.
Benefits of implementing CIS Controls.
Understanding the structure of CIS Controls v8 with a focus on Safeguards.
Introduction to CIS Critical Security Controls Implementation Groups (IGs) and their purpose.
Module 1 Q&A Session and Course Review
Module 2: Breakdown of the 18 CIS Controls
This section will cover each of the 18 CIS Controls in detail, including:
A clear explanation of the control's objective.
The associated Safeguards and their implementation recommendations.
Examples of how the control can be implemented in different IT environments.
Real-world scenarios where the control can prevent cyberattacks.
Module 2 Q&A Session and Course Review
Module 3: Implementing CIS Controls in Your Organization
Introduction to the CIS Risk Assessment Method (CIS RAM) and its role in prioritizing CIS Controls implementation.
Prioritization and selection of relevant CIS Controls based on organizational needs, risk profile, and Implementation Group (IG) membership.
Strategies for integrating CIS Controls into existing security policies and procedures.
Considerations for implementing CIS Controls in Cloud and hybrid environments.
Resources and tools available to assist with CIS Controls implementation (e.g., CIS CSAT).
Module 3 Q&A Session and Course Review
Module 4: Best Practices and Ongoing Management
Importance of continuous monitoring and improvement of CIS Controls implementation.
Best practices for user awareness training and promoting a culture of security.
Maintaining compliance with CIS Controls and adapting them to evolving threats.
Mapping CIS Controls to other security frameworks such as ISO 27001 and NIST CSF.
Module 4 Q&A Session and Course Review
Training Methodology
This CIS Controls v8 training workshop utilizes a variety of engaging and interactive learning methods to ensure a comprehensive understanding and practical application of the controls.
Here's what you can expect:
Experienced instructors with real-world experience will guide you through the core principles, objectives, and implementation strategies of CIS Controls v8.
Interactive discussions to share experiences, ask questions, and gain valuable insights from fellow participants.
Analyzing case studies exploring successful implementations of CIS Controls.
Hands-on exercises such as prioritizing and selecting CIS Controls for your organization, developing sample implementation plans based on your IG, and mapping CIS Controls to other frameworks (optional, depending on time).
Quizzes and poll questions will help you gauge your understanding throughout the workshop.
You'll receive a comprehensive course material with all the key concepts, resources, and references covered during the training.
Back Registration