SEC566.1: Introduction and Overview of the 20 Critical Controls

A session at Critical Security Controls Summit

Wednesday 14th August, 2013

9:00am to 5:00pm (EST)

This course has been written to help those implementing or deploying a strategy for information assurance in their agency or organization by enabling them to better understand these guidelines. Specifically the course has been designed in the spirit of the offense teaching the defense to help security practitioners understand not only what to do to stop a threat, but why the threat exists and how later to audit to ensure that the organization is indeed in compliance with their standards.

At the end of Audit 566, students should better understand:

How to create a strategy for successfully defending their data
How to implement controls to prevent data from being compromised
How to audit systems to ensure compliance with the standard

And in SANS style, this course will not only provide a framework for better understanding, but will give you a hands-on approach to learning these objectives to ensure that what you learn today, you'll be able to put into practice in your organization tomorrow.

This course helps you master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. These Top 20 Security Controls, listed below, are rapidly becoming accepted as the highest priority list of what must be done and proven before anything else at nearly all security-conscious organizations.

About the speaker

This person is speaking at this event.
Dr. Eric Cole

Dr. Cole- cyber security professional, instructor, keynote speaker & expert witness. He is a senior fellow with SANS & security consultant. bio from Twitter

Sign in to add slides, notes or videos to this session

Tell your friends!


Time 9:00am5:00pm EST

Date Wed 14th August 2013

Short URL


Official event site


View the schedule


See something wrong?

Report an issue with this session