Reader small image

You're reading from  A CISO Guide to Cyber Resilience

Product typeBook
Published inApr 2024
PublisherPackt
ISBN-139781835466926
Edition1st Edition
Right arrow
Author (1)
Debra Baker
Debra Baker
author image
Debra Baker

Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."
Read more about Debra Baker

Right arrow

Creating your security baseline

The secure configuration of your endpoints, cloud assets, and network devices is paramount to protecting your company from hackers. Gartner has said that 99% of cloud and network breaches are due to misconfiguration. This is something you can do for free. It’s not an easy task, but it is well worth it and probably one of the most important actions you can take other than MFA and regular patching. We discussed this previously, but CIS is the de facto secure configuration standard for the commercial space, and STIGS are required for US Federal government networks and FedRAMP. The good news is that there are mappings of CIS to SOC2, HIPAA, NIST CSF, and PCI on the CIS website. As I’ve stated before, there are compliance products, such as Drata, that will automate the controls you need to meet. There is also a compliance mapping you can download for free called the Secure Controls Framework (SCF). It offers a master mapping of almost every...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
A CISO Guide to Cyber Resilience
Published in: Apr 2024Publisher: PacktISBN-13: 9781835466926

Author (1)

author image
Debra Baker

Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."
Read more about Debra Baker