Social Links
- Twitter: https://twitter.com/StumblingSecPod
- Twitter: https://twitter.com/0xSeanG
- iTunes: https://podcasts.apple.com/us/podcast/stumbling-through-security/id1460066606
- Spotify: https://open.spotify.com/show/68FkkuGPamw9dXi7UvQGGr
- Google Play: https://play.google.com/music/m/Ifs2tqq7eygukzq6q2atcsx3ibm
- YouTube: https://www.youtube.com/channel/UCPvejV6bXlkBCWergalHVfg
Show Notes
- CIS Controls Resource Page: https://www.cisecurity.org/controls/cis-controls-list/
- My Blog Post Series:
- CIS CSC #1 – Inventory and Control of Hardware Assets: https://seangoodwin.blog/cis-csc-1
- CIS CSC #2 – Inventory and Control of Software Assets: https://seangoodwin.blog/cis-csc-2
- CIS CSC #3 – Continuous Vulnerability Management: https://seangoodwin.blog/cis-csc-3
- CIS CSC #4 – Controlled Use of Administrative Privileges: https://seangoodwin.blog/cis-csc-4
- CIS CSC #5 – Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers: https://seangoodwin.blog/cis-csc-5
- CIS CSC #6 – Maintenance, Monitoring and Analysis of Audit Logs: https://seangoodwin.blog/cis-csc-6