Concanon Controls Assessment
We hear of another new cybersecurity breach or widespread ransomware attack nearly every week. If you're a CISO or run a SOC, these are the things of nightmares. You and your team have worked hard to defend your organization from a broad set of cyber threats. You think you're prepared. But are you? The threat landscape changes quickly. Have you implemented best practice security controls for today's threats to your infrastructure?
The Center for Internet Security publishes the acknowledged reference standards for cybersecurity policies and procedures. Concanon continually supports the CIS community in the development and implementation of the controls through training and certifications. Our team of cybersecurity professionals can perform a review of your organization's security posture against the CIS 20 Security Control. We'll help you and your security team implement cybersecurity controls to assure that your organization is kept safe.Our assessment mixes an interactive review of the controls with key stakeholders and technical analysis with Splunk Enterprise at its core. Leveraging a maturity model we are able to provide the following documented items.
- Development Roadmap - Prioritize and grow your enterprise based on your risk tolerance assigned with a maturity model.
- Content Development - Build and create new use cases associated with Security controls that enhance your security posture.
- Gap Analysis - Identify gaps in coverage based on a control framework developed by a community of the world's leading security experts.
The Concanon team is the only Splunk Professional Services team trained and authorized to perform CIS Control Assessments. Concanon's Cybersecurity team can quickly give you peace of mind about your organization's security readiness.
CIS Top 20 Critical Security Controls
CSC 1: Inventory of Authorized and Unauthorized Devices
CSC 2: Inventory of Authorized and Unauthorized Software
CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
CSC 4: Continuous Vulnerability Assessment and Remediation
CSC 5: Controlled Use of Administrative Privileges
CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
CSC 7: Email and Web Browser Protections
CSC 8: Malware Defenses
CSC 9: Limitation and Control of Network Ports, Protocols, and Services
CSC 10: Data Recovery Capability
CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
CSC 12: Boundary Defense
CSC 13: Data Protection
CSC 14: Controlled Access Based on the Need to Know
CSC 15: Wireless Access Control
CSC 16: Account Monitoring and Control
CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps
CSC 18: Application Software Security
CSC 19: Incident Response and Management
CSC 20: Penetration Tests and Red Team Exercises
We're International
Concanon is now international! Concanon currently provides some of the world's most talented and experienced consultants in Splunk/Big Data, Business Analytics, CyberSecurity and Cloud/AWS to clients in North America and Europe, the Middle East and Asia. If you have a project in EMEA, let's talk. We may be able to help.