See How Realistic Cyber Defense Is in a New Trailhead Course
Our team works with Salesforce Trailhead to create free courses designed to help you implement the CIS Critical Security Controls® (CIS Controls®). We began by releasing an introductory course on how you can use Implementation Group 1 (IG1) of the CIS Controls v8 to achieve essential cyber hygiene. Shortly thereafter, we announced a trail that explains how you can leverage the CIS Risk Assessment Method (RAM) to guide your Controls implementation plan.
We're excited to unveil yet another course on Salesforce Trailhead. In this blog post, we'll quickly discuss how it guides you through the realistic costs of strengthening your cyber defense program.
Understanding the Value of Security Controls
Our latest module on Salesforce Trailhead is entitled "The Value of Security Controls." It consists of two modules: "Integrate Security Controls" and "Balance Integrity and Trust in Security Decisions."
Integrate Security Controls
Estimated time of completion: 10 minutes
"Integrate Security Controls" reflects the importance of confidential, accurate, and available information as it relates to leaders and their ability to make business decisions. To help learners safeguard information for leaders in their organizations, the module incorporates "The Cost of Cyber Defense: CIS Controls Implementation Group 1." This guide estimates the costs of implementing CIS Safeguards in IG1, empowering learners to plan out how they will realistically implement security measures that align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework 1.0.
In addition, the module uses a vehicle as an analogy to demonstrate the value of security controls. It groups security controls into 10 categories and shows how these organizational units support leaders in making decisions that reflect evolving business goals.
Balance Integrity and Trust in Security Decisions
Estimated time of completion: 5 minutes
"Balance Integrity and Trust in Security Decisions" provides a brief knowledge check that learners can use to evaluate their understanding of the previous unit. It then emphasizes how integrity as a principle of the CIA Triad helps to establish trust in business information. This trust permeates many different areas of cybersecurity, including how organizations in three sectors — finance, manufacturing, and healthcare — respond to top industry-specific cyber threats with security controls.
Revolutionize Your Approach to Cyber Defense
You know how your organization needs to continue to evolve its cyber defense program. Now you just need to develop a realistic plan so that you can implement the security controls and invest in the technologies you need most.
Ready to step up your organization's cyber defenses?