Continuous Monitoring with the 20 Critical Security Controls (CSC)

  • Wednesday, February 26, 2014 | 9:20 AM – 10:20 AM | North | Room: 131

View all Sessions

The 20 CSC outline a practical approach to implementing security technologies by providing proven guidelines for protecting IT environments. Continuous monitoring plays a critical role in implementing the 20 CSC and the good news is that there are new tools that can automate the 20 CSC. This session details how to use these tools to protect corporate environments and keep your data secure.


This document was retrieved from on Sun, 18 Aug 2019 11:21:18 -0400.