Skip to content ↓ | Skip to navigation ↓

The Top Twenty Critical Security Controls are rated on a scale of importance from Very High down to Low, with the first four controls forming the foundation that all others will build upon in order to create a robust enterprise security program.

Click image to download PDF booklet

This complimentary guide examines those four foundational controls and explains why every organization must absolutely have these protocols in place to ensure they have achieved the minimum level of security.

For each of these four critical controls, we will discuss the three most important mitigating factors, as well as provide guidance on what you should do next if your security controls are lacking.

Download this special publication here (PDF), or if you are in San Francisco to attend the RSA Conference 2014, stop by Tripwire’s Booth (3501) to receive a complimentary hard copy poster of the twenty critical questions to display in your office.

Also available as PDF download or in hard copy at Tripwire’s RSAC booth is a handy users guide for the Twenty Critical Questions for Security Programs, the questions that you must address in order to find the gaps in your security before the attackers do it for you.

Then go even deeper with our array of guides and resources to make sure your organization is protected.

picAs an added bonus, stop by Tripwire’s booth to get your free customized t-shirt printed on the spot, and listen to an array of in-booth guest speakers we have lined up.

For the speaking schedule and information on how to obtain a free RSA Expo pass, see more details here.


Related Articles:



picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].


picDefinitive Guide to Attack Surface Analytics

Also: Pre-register today for a complimentary hardcopy or e-copy of the forthcoming Definitive Guide™ to Attack Surface Analytics. You will also gain access to exclusive, unpublished content as it becomes available.