{"id":206,"date":"2011-04-25T10:30:00","date_gmt":"2011-04-25T10:30:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/04\/25\/sans-national-cybersecurity-innovation-conference\/"},"modified":"2011-04-25T10:30:00","modified_gmt":"2011-04-25T10:30:00","slug":"sans-national-cybersecurity-innovation-conference","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/sans-national-cybersecurity-innovation-conference\/","title":{"rendered":"SANS National CyberSecurity Innovation Conference"},"content":{"rendered":"
Last week I had the opportunity to attend and participate in a panel discussion at the first SANS<\/a> National CyberSecurity Innovation Conference<\/a> in Washington, DC. While there I was able to learn from other security practitioners representing a wide array of industries each describe how they are securing their networks in creative ways. More often than not, success was achieved by leveraging existing tools and capabilities.<\/p>\n One of the more compelling topics was the Department of State<\/a> implementation of the SANS Top 20 Security Controls<\/a>. It was noteworthy that the Department of State was able to achieve an 85% decrease<\/b> in vulnerabilities in the first year. What else are you doing that has this success rate?<\/p>\n SANS provides several resources to help understand and implement these controls, which ultimately provide the basis for continuous monitoring capabilities. There have been several webcasts<\/a> on the Top 20 Controls. The most recent featured James Tarala<\/a> who led a discussion<\/a> on how a SIEM product can help implement these controls. Other resources are case studies<\/a>, the Security 440<\/a> two day class and Security 566<\/a>, a five day class on understanding and implementing these controls.<\/p>\n","protected":false},"excerpt":{"rendered":" Last week I had the opportunity to attend and participate in a panel discussion at the first SANS National CyberSecurity Innovation Conference in Washington, DC. While there I was able to learn from other security practitioners representing a wide array of industries each describe how they are securing their networks in creative ways. More often […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n