Webcast Review Webinar: Ten security controls for effective cyber-security

Lukman Jaji

October, 2019

Introduction

The webcast was presented in 2018, and was about security controls for effective cybersecurity. It was organized and facilitated by the Center for Internet Security, to educate individuals on their own cyber security controls. The webcast was of high    quality and was properly organized with appropriate visuals.

Quality of the Speaker

 The presenter Giridhara Raam was also clear and gave full explanations of concepts. The webcast is easy to understand even for non-IT specialists. The presenter is a cyber security analyst and a General Data Protection Regulation researcher. The speaker has a little bit of a Indian accent.

Audience

The intended audience for the webinar include IT/IS professionals, students undertaking information technology related courses and general public because cybersecurity affects all individuals and they would gain immense knowledge on the concept.

Content

The content is conclusive and easy to understand even for Non-IT professionals. The speaker introduced the concept of cybersecurity well and widely. The body of the webcast was also well organized and the content delivered appropriately, with the speaker giving examples throughout the webinar. This makes listening to the webinar more interesting. The content also ensured that it engaged the listeners/watchers, mostly by using the question and answer method. Some of the relevant content is also displayed on the video to enhance visualization and absorption of the content.

The webinar touched on the Security controls well and these were grouped as;

  1. Basic controls, which include inventory and control of hardware and software assets, continuous vulnerability management, controlled use of administrative privileges, secure configuration for hardware and software, and maintenance and monitoring of audit logs.  
  2. Foundational Controls which include email and web browser protection, malware and boundary defenses, control of network ports, data recovery capabilities, data protection and wireless access controls.
  3. Organizational controls; these involve the implementation of security awareness and training, incident response, software security and penetration tests.

Through the webinar, I was able to learn about authorized and unauthorized software and my role as an Information system professional in order to enhance the security of Information and computers. From the presentation, the speaker seems to be very knowledgeable about the topic of cybersecurity. The presentation is very educative and would be recommended for further learning on cybersecurity. Students and professionals will gain immensely from this webinar on the subject of security. The content displayed on the screen however, does not run concurrently with the speaker as the speaker is lagging behind.

Webinar Available at: <https://www.youtube.com/watch?v=bSPY_rn8uWY>

Leave a Reply

Your email address will not be published. Required fields are marked *