Effectively Implement and Monitor Critical Security Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
Critical Controls Webinar Series – Session 3 of 5
Are your systems running unneeded services that unnecessarily increase your attack surface? How are you ensuring conformance with hardening guidelines and industry best practices? And how well are you detecting unusual and unexpected changes?
To get smarter about strengthening system configurations across your enterprise, join us at 2pm ET for our June 21, 2017 webinar, “Effectively Implement and Monitor Critical Security Control 3 – Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers.”
Hosted by Ted Gary of Tenable, this webinar will be led by guest expert, Brian Ventura, Information Security Architect with the City of Portland and Critical Security Controls instructor for SANS. The session will also feature a brief demonstration of Tenable SecurityCenter Continuous View®.
By attending this webinar you will gain:
- Expert advice, guidance and best practices for implementing and monitoring conformance with Critical Control 3.
- Insight into how Tenable automates and supports effective control adoption
- Answers to your questions and comments during a live Q&A session
Reserve your spot, register today.