{"id":247,"date":"2018-02-23T00:41:00","date_gmt":"2018-02-23T00:41:00","guid":{"rendered":"https:\/\/securityeverafter.com\/2018\/02\/23\/cis-controls-version-7\/"},"modified":"2018-02-23T00:41:00","modified_gmt":"2018-02-23T00:41:00","slug":"cis-controls-version-7","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/cis-controls-version-7\/","title":{"rendered":"CIS Controls Version 7"},"content":{"rendered":"

I recently posted the <\/span>below<\/a> on the <\/span>SANS Internet Storm Center<\/a>.<\/span>
\n
\n<\/span>The
Center for Internet Security<\/a> (CIS) has been working diligently to update the CIS Controls<\/a> (formerly known as the Critical Security Controls). A compelling feature of the CIS Controls<\/a> is their regular updates<\/a> that reflect the current cyber threats that face organizations, both small and large<\/a>. The CIS Controls<\/a> are the product of a truly global collaboration effort. \u201cThe CIS Controls have always been the product of a global community of adopters, vendors, and supporters, and V7 will be no exception,\u201d said Tony Sager, CIS Senior Vice President and Chief Evangelist for the CIS Controls<\/a>.<\/p>\n

CIS is providing an opportunity to participate in the CIS Controls<\/a> Version 7 release event<\/a> that takes place March 19 in Washington, D.C., with options to either attend in-person or remotely via live stream. If you have not yet applied the CIS Controls<\/a> in your environment, the release event<\/a> can serve as the catalyst you need to consider them as an integral part of your cyber roadmap!<\/p>\n

Russell Eubanks
\n
ISC Handler<\/a>
\n
SANS Instructor<\/a>
\n<\/span>
\n
@russelleubanks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

I recently posted the below on the SANS Internet Storm Center. The Center for Internet Security (CIS) has been working diligently to update the CIS Controls (formerly known as the Critical Security Controls). A compelling feature of the CIS Controls is their regular updates that reflect the current cyber threats that face organizations, both small and large. The CIS Controls are the product of a […]<\/p>\n","protected":false},"author":4,"featured_media":549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[30,12],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\nCIS Controls Version 7 - Security Ever After - vCISO<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIS Controls Version 7 - Security Ever After - vCISO\" \/>\n<meta property=\"og:description\" content=\"I recently posted the below on the SANS Internet Storm Center. The Center for Internet Security (CIS) has been working diligently to update the CIS Controls (formerly known as the Critical Security Controls). A compelling feature of the CIS Controls is their regular updates that reflect the current cyber threats that face organizations, both small and large. The CIS Controls are the product of a […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Ever After - vCISO\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-23T00:41:00+00:00\" \/>\n<meta name=\"author\" content=\"Russell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:site\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Russell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\"},\"author\":{\"name\":\"Russell\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\"},\"headline\":\"CIS Controls Version 7\",\"datePublished\":\"2018-02-23T00:41:00+00:00\",\"dateModified\":\"2018-02-23T00:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\"},\"wordCount\":196,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Critical Security Controls\",\"cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\",\"url\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\",\"name\":\"CIS Controls Version 7 - Security Ever After - vCISO\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-02-23T00:41:00+00:00\",\"dateModified\":\"2018-02-23T00:41:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityeverafter.com\/cis-controls-version-7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityeverafter.com\/cis-controls-version-7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityeverafter.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIS Controls Version 7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityeverafter.com\/#website\",\"url\":\"https:\/\/securityeverafter.com\/\",\"name\":\"Security Ever After - CISO\",\"description\":\"vCISO\",\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityeverafter.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securityeverafter.com\/#organization\",\"name\":\"Security Ever After\",\"url\":\"https:\/\/securityeverafter.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"width\":1169,\"height\":826,\"caption\":\"Security Ever After\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/russelleubanks\",\"https:\/\/www.linkedin.com\/in\/russelleubanks\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\",\"name\":\"Russell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"caption\":\"Russell\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIS Controls Version 7 - Security Ever After - vCISO","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityeverafter.com\/cis-controls-version-7\/","og_locale":"en_US","og_type":"article","og_title":"CIS Controls Version 7 - Security Ever After - vCISO","og_description":"I recently posted the below on the SANS Internet Storm Center. The Center for Internet Security (CIS) has been working diligently to update the CIS Controls (formerly known as the Critical Security Controls). A compelling feature of the CIS Controls is their regular updates that reflect the current cyber threats that face organizations, both small and large. The CIS Controls are the product of a […]","og_url":"https:\/\/securityeverafter.com\/cis-controls-version-7\/","og_site_name":"Security Ever After - vCISO","article_published_time":"2018-02-23T00:41:00+00:00","author":"Russell","twitter_card":"summary_large_image","twitter_creator":"@russelleubanks","twitter_site":"@russelleubanks","twitter_misc":{"Written by":"Russell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#article","isPartOf":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/"},"author":{"name":"Russell","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3"},"headline":"CIS Controls Version 7","datePublished":"2018-02-23T00:41:00+00:00","dateModified":"2018-02-23T00:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/"},"wordCount":196,"commentCount":0,"publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"image":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage"},"thumbnailUrl":"","articleSection":["Critical Security Controls","cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/securityeverafter.com\/cis-controls-version-7\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/","url":"https:\/\/securityeverafter.com\/cis-controls-version-7\/","name":"CIS Controls Version 7 - Security Ever After - vCISO","isPartOf":{"@id":"https:\/\/securityeverafter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage"},"image":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-02-23T00:41:00+00:00","dateModified":"2018-02-23T00:41:00+00:00","breadcrumb":{"@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityeverafter.com\/cis-controls-version-7\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/securityeverafter.com\/cis-controls-version-7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityeverafter.com\/"},{"@type":"ListItem","position":2,"name":"CIS Controls Version 7"}]},{"@type":"WebSite","@id":"https:\/\/securityeverafter.com\/#website","url":"https:\/\/securityeverafter.com\/","name":"Security Ever After - CISO","description":"vCISO","publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityeverafter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/securityeverafter.com\/#organization","name":"Security Ever After","url":"https:\/\/securityeverafter.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","contentUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","width":1169,"height":826,"caption":"Security Ever After"},"image":{"@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/russelleubanks","https:\/\/www.linkedin.com\/in\/russelleubanks\/"]},{"@type":"Person","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3","name":"Russell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","caption":"Russell"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/247"}],"collection":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/comments?post=247"}],"version-history":[{"count":0,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/media?parent=247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/categories?post=247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/tags?post=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}