Skip to content
    Search
    Request A Free Trial
    Video

    Achieving CIS Controls 1 & 2 with Cybersecurity Asset Management

    The Center for Internet Security (CIS) lists a prioritized set of actions to protect organizations from known cyber attack vectors. Known as the CIS 20, the list is broken down into:

    • 6 Basic CIS Controls
    • 10 Foundational CIS Controls
    • 4 Organizational CIS Controls

    The most basic controls, CIS 1 and 2 are covered in this short video. In it, we demonstrate how a cybersecurity asset management solution like Axonius can automatically provide what organizations need to achieve these controls. 

    You will learn:

    • The necessary steps to achieving CIS Control 1, including how to inventory, track, and correct all devices
    • How to achieve CIS Control 2 by identifying and documenting all software, and developing a whitelist of approved software
     
    Axonius Blog

    What the New SEC Guidelines Mean for Cybersecurity Teams in 2024

    Stay up to date on the latest IT and cybersecurity trends, Axonius product updates, and tips and tricks.

    Resources

    Mastering Cybersecurity Measurement

    View our latest research, customer stories, technical documents, and other useful links.

    Webinars

    Now What? When Cybersecurity Disclosure Rules Widen the Gap Between Reputation and Risk

    Learn proven strategies for improving your IT and security functions within your organization.