Name
The Foundation of Assessment: Identifying High-Risk Endpoints and Establishing a Risk Registry
Date & Time
Wednesday, June 13, 2018, 10:45 AM - 11:15 AM
Erik Navratil
Description
 
Understanding and continuously assessing endpoints can be the difference between securing an environment or becoming the next Office of Civil Rights (OCR) breach example.  According to the Center for Internet Security's Controls framework, the first five controls are foundational principles for effective cyber hygiene.  These tenants include understanding the inventory of authorized and unauthorized devices, along with authorized and unauthorized software.  In a recent Dimensional Research survey, 52 percent of respondents indicated their cybersecurity program has either major weaknesses, or several minor weaknesses.  Identifying and building a thorough endpoints risk registry is ultimately paramount to future success.
 
In this session, visit with our expert speaker as he identifies the top practices for information security, and how understanding network end point weaknesses can help organizations build and understand their cybersecurity risk profile.