![Page 1: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/1.jpg)
Global Cyberawakening with Jane Holl Lute& Rod MurchisonSEPTEMBER 12, 2013
![Page 2: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/2.jpg)
GLOBAL CYBERAWAKENING WITH JANE HOLL LUTE& ROD MURCHISON
September 12, 2013
![Page 3: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/3.jpg)
3
Jane Holl Lute
The Council on CyberSecurity is an independent, expert, not-for-profit organization with a global scope committed to the security of an open Internet.
Dedicated to the dual goals of Preserving an open Internet Encouraging the adoption of best
practices to secure computer systems against cyberattacks
Former Deputy Secretary of the Department of Homeland Security
Now President and CEO of Council on Cybersecurity
Security strategist and technology leader in the industry for nearly 20 yrs
Tripwire, Boeing, Juniper Networks, Blue Coat Systems, Rod is currently Vice President of Product Management for Tripwire
Rod Murchison
![Page 4: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/4.jpg)
4
Global Cyberawakening
What is the global cyberawakening?
![Page 5: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/5.jpg)
5
Global Cyberawakening
What is the global cyberawakening?
Who are the powerful actors?
![Page 6: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/6.jpg)
6
Global Cyberawakening
What is the global cyberawakening?
Who are the powerful actors?
What is the role of government?
![Page 7: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/7.jpg)
7
Global Cyberawakening What power matters in cyberspace?
![Page 8: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/8.jpg)
8
Global Cyberawakening What power matters in cyberspace?
How should we understand threats and vulnerabilities?
![Page 9: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/9.jpg)
9
Global Cyberawakening What power matters in cyberspace?
How should we understand threats and vulnerabilities?
Who is responsible for our cybersecurity?
![Page 10: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/10.jpg)
10
Global Cyberawakening What power matters in cyberspace?
How should we understand threats and vulnerabilities?
Who is responsible for our cybersecurity? The Fog of “More”
![Page 11: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/11.jpg)
11
Global Cyberawakening What is the Council on Cybersecurity?
The cybersecurity ecosystem
![Page 12: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/12.jpg)
12
Global Cyberawakening What is the Council on Cybersecurity?
The cybersecurity ecosystem
Technology, Manpower, Policy
![Page 13: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/13.jpg)
13
Global Cyberawakening What is the Council on Cybersecurity?
The cybersecurity ecosystem
Technology, Manpower, Policy
Identify, validate, promote and sustain best practices
The 20 CSCs
www.counciloncybersecurity.org
![Page 14: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/14.jpg)
14
Q & A
http://www.counciloncybersecurity.org
![Page 15: Implementing the SANS 20 Critical Security Controls](https://reader036.vdocuments.us/reader036/viewer/2022062300/55757dc3d8b42adb7e8b4e74/html5/thumbnails/15.jpg)
tripwire.com | @TripwireInc
WWW.TRIPWIRE.COM/BLOG
THANK YOU