What if you were focused on the external threat landscape (DoS, malware, phishing) while there was an internal threat you didn’t know about? What if, despite your efforts to protect against outsiders, you were still leaving doors open for them?
Misconfiguration has become an increasingly popular avenue for hackers to access your organization’s infrastructure. In the 2020 Data Breach Investigation Report by Verizon, misconfiguration surpassed ransomware as a leading cause of data breaches.
Join us for an overview of the threat posed by misconfiguration and how Configuration Compliance can:
• link security standards (i.e. HIPAA, CIS Benchmarks, Microsoft Security Compliance) with scanner results and identify failed tests
• auto-assign remediation tasks to relevant support teams
• integrate with existing change management processes
Andrea Castillo, CISSP, Practice Director, Risk & Security, Crossfuze
Kevin Urbanek, Technical Architect, Risk & Security, Crossfuze
Anderson Ferneyhough, Masters in Cyber Security, Technical Consultant, Crossfuze