The Role of Breach Controls in Network Security

Phyllis Lee of CIS Discusses Prioritizing Defense Steps
Phyllis Lee, senior director of controls, Center for Internet Security

If a breach happens, how can you defend your choice of controls - technical and procedural - to implement to improve your network security?

See Also: Ransomware Demystified: What Security Analysts Need to Know

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Phyllis Lee, senior director of controls at the Center for Internet Security, discusses:

  • A preview of Controls Version 8 - what’s new and what’s been dropped;
  • What you should do first to control your data;
  • How CIS controls fit in with other frameworks.

Prior to joining CIS, Lee worked at the U.S. National Security Agency, focusing on the intersection between malware and virtualization, which included work that led the security automation strategy for the NSA Information Assurance Directorate.

About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran tech journalist, editor and presenter. He covered cybersecurity for the past seven years at SC Media and IT Security Guru. He previously covered banking, fraud, risk, electronic payments, telecoms and broadband issues. He spent seven years as an editor based in the Middle East and worked on ventures covering Hong Kong and Ukraine.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.