Cybersecurity Weekly - Season 1, Episode 17

Share:

Listens: 0

Business and Technology in Tennessee with Josh Davis

Business


In this episode, Fred and Rob discuss controlling the use of administrative privileges, the process of managing privileges on computers, networks, and applications. The controlled use of administrative privileges is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, and practices Continuous Vulnerability Management (following the CIS Top 20 Cybersecurity Controls).