CIS Controls for Effective Cyber Defense

- Verizon 2018 Data Breach Investigations Report

Who's behind the breaches?

What tactics do they used?

What else is common?




of the breaches are from outsiders and involved organized criminal groups.

of hacking-related breaches leverage either stolen and/or weak passwords.

of malware was installed via malicious email attachment and were financially motivated

Overseeing Problem: Same issues over & over

The vast majority of compromises are based on known problems that have known solutions. As defenders we have access to an extraordinary array of security tools and technology, security standards, training and classes, certification, vulnerability database, guidance, best practices and many more.


But all of this technology, information, and oversight has become veritable “Fog of more”: competing options, priorities, opinions and claims that can paralyze or distract enterprise from vital action. In this complex, interconnected world, no enterprise can think of its security as a standalone problem.

CIS Controls for Effective Cyber Defense

The CIS Controls are informed by actual attacks and effective defenses and reflect the combined knowledge of expert from every part of the ecosystem (company, government, and individuals) with every role who have banded together to create, adopt, and support the controls.


This ensures that the controls are the most effective and specific set of technical measures available to detect, prevent respond and mitigate damage from the most common to the most advanced of those attacks.



WINTTUX - IT Security & Consulting firm specializes in helping organizations to achieve security assurance by protecting, improving operational efficiency and developing advanced cybersecurity solutions.


Sign up for our weekly newsletter

Submitting Form...

The server encountered an error.

Form received.


+603-5524 1997


B2-2-2 Solaris Dutamas,

No.1 Jln. Dutamas 1, 50480

Kuala Lumpur, Malaysia

© 2018 Winttux Solutions

Privacy Policy