{"id":248,"date":"2017-10-07T12:48:00","date_gmt":"2017-10-07T12:48:00","guid":{"rendered":"https:\/\/securityeverafter.com\/2017\/10\/07\/cis-controls-implementation-guide-for-small-and-medium-sized-enterprises\/"},"modified":"2023-02-22T11:38:30","modified_gmt":"2023-02-22T16:38:30","slug":"cis-controls-implementation-guide","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/cis-controls-implementation-guide\/","title":{"rendered":"CIS Controls Implementation Guide"},"content":{"rendered":"

CIS Controls Implementation Guide<\/h1>\n

\"Female<\/h1>\n

The CIS Controls Implementation Guide<\/a> was recently released by the Center for Internet Security (CIS)<\/a>, the home of CIS Controls<\/a> directly mapped to their CIS Controls<\/a>. It is<\/span> focused on actionable steps that can be taken right now to assess and improve cyber security posture and preparedness, particularly in\u00a0small and medium-sized enterprises. Recently a <\/span>webinar<\/a> with some team members who helped develop the <\/span>Implementation Guide<\/a> was recorded.\u00a0\u00a0<\/span><\/p>\n

<\/div>\n
The guide focuses on three key areas of<\/div>\n