Episode 22 – CIS 1 Inventory Of Devices

We begin the CIS CSC Top 20 breakdown with control number one. Inventory of authorized and unauthorized devices. What does it mean? How do you approach it? How can hackers exploit this?

Be aware, be safe.

Music in this episode:
Starchild by Mystery Mammal is licensed under a Attribution-ShareAlike License.

Check out this episode!

Please follow and like us:
Pin Share

Become a Patron!

Follow me on Twitter


Member of The Internet Defense League

Enjoy this blog? Please spread the word :)

Follow by Email