Unplanned change is the enemy of security and availability. Whether it comes from an advanced adversary, a malicious insider or a trusted employee, understanding change in your IT environment can help you identify the difference between a simple modification and a malicious attack. Travis Smith, Principal Security Researcher at Tripwire, demonstrates real-world attacks, analyzes how attackers commonly gain access to improperly configured systems, and shows the impact data breaches can have on an organization. You will get a breakdown of the Center for Internet Security’s (CIS) Critical Security Controls, which when implemented, can reduce your risk of cyber attack by up to 85% by: • Continuously inventorying all hardware/software assets • Establishing standard secure configurations • Running automated vulnerability scanning tools • Minimizing anomalous behavior with better administrative privileges