Social Links
- Twitter: https://twitter.com/StumblingSecPod
- Twitter: https://twitter.com/0xSeanG
- iTunes: https://podcasts.apple.com/us/podcast/stumbling-through-security/id1460066606
- Spotify: https://open.spotify.com/show/68FkkuGPamw9dXi7UvQGGr
- Google Play: https://play.google.com/music/m/Ifs2tqq7eygukzq6q2atcsx3ibm
- YouTube: https://www.youtube.com/channel/UCPvejV6bXlkBCWergalHVfg
Show Notes
- CIS Controls Resource Page: https://www.cisecurity.org/controls/cis-controls-list/
- My Blog Post Series:
- CIS CSC #7 – Email and Web Browser Protections: https://seangoodwin.blog/cis-csc-7
- CIS CSC #8 – Malware Defenses: https://seangoodwin.blog/cis-csc-8
- CIS CSC #9 – Limitation and Control of Network Ports, Protocols and Services: https://seangoodwin.blog/cis-csc-9
- CIS CSC #10 – Data Recovery Capabilities: https://seangoodwin.blog/cis-csc-10
- CIS CSC #11 – Secure Configuration for Network Devices, such as Firewalls, Routers and Switches: https://seangoodwin.blog/cis-csc-11