The Role of Breach Controls in Network Security

Phyllis Lee of CIS Discusses Prioritizing Defense Steps
Phyllis Lee, senior director of controls, Center for Internet Security

If a breach happens, how can you defend your choice of controls - technical and procedural - to implement to improve your network security?

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Phyllis Lee, senior director of controls at the Center for Internet Security, discusses:

  • A preview of Controls Version 8 - what’s new and what’s been dropped;
  • What you should do first to control your data;
  • How CIS controls fit in with other frameworks.

Prior to joining CIS, Lee worked at the U.S. National Security Agency, focusing on the intersection between malware and virtualization, which included work that led the security automation strategy for the NSA Information Assurance Directorate.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.