Watch this two-part webinar series to help your organization safeguard IT infrastructure and sensitive data. Discover how to leverage the CIS Critical Security Controls framework for File Integrity Monitoring, streamline data discovery and classification, and implement governance strategies to reduce risks and enhance compliance.
A strong foundation is essential for modern IT infrastructure — and the same holds true for the tools that protect it. In this webinar, we’ll highlight the collaboration between Netwrix and the Center for Internet Security (CIS), demonstrating how their joint efforts go beyond compliance checklists to boost security capabilities across your organization.
This session will provide:
Mia LaVada is a product manager for the CIS Benchmarks and Cloud products at the Center for Internet Security (CIS). She has been with CIS since June 2019. As a strong believer in the power of community, Mia regularly works with CIS Members to help ensure CIS addresses the needs of the global cybersecurity community. She’s also particularly passionate about finding solutions to further secure the ever-changing cloud ecosystem.
James Anderson is a Product Manager for Netwrix Enterprise Auditor and Netwrix Change Tracker. He has over 15 years of experience in software and data, including roles as Lead Data Engineer, Data Architect, and DBA.
As organizations handle vast amounts of data across multiple repositories, the need for comprehensive data management has never been greater. In this webinar, we'll explore how Data Discovery and Classification lay the foundation for effective governance and privacy. You'll learn how the various disciplines of data management must work together to secure sensitive information and ensure compliance, while addressing the challenges of excessive access, complex entitlements, and endpoint vulnerabilities.
Watch the session to learn how to:
Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).