Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling

ShmooCon IX - 2013

Presented by: John Willis
Date: Saturday February 16, 2013
Time: 19:35 - 19:50
Location: Regency A
Track: Fire Talks

The 20 Critical Security Controls are used to create and utilize a tailored methodology for gap assessment and remediation priorization and planning. The Critical Controls for Effective Cyber Defense are then evaluated for use in creating a standardized Security Maturity Model for baselining security posture and future comparison. The presentation is intended to elicit audience feedback and participation in determining the future of such methodologies and models.

John Willis


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats