Blog

Grab our eBook: The Essential Introduction to CIS 20 Implementation

Ted Gruenloh
CEO @ Nomic Networks
July 21, 2020

Ransomware, malware, and other cyber threats are only increasing in frequency and sophistication, yet many can be avoided with some simple guidance from the CIS Controls developed by the Center for Internet Security.

Getting started is the hardest part, but the CIS Controls make it easy, by focusing on the basics like inventory and asset controls, patch management, and perimeter defense.

Take the first step and click below for an instant download of our essential introduction to CIS Controls.

Ted Gruenloh
CEO @ Nomic Networks

Ted has worked with network security and web technologies for almost 30 years, beginning his career as a full-stack web engineer and transitioning to network security. He now guides Nomic and its supporting initiatives, including CINS Active Threat Intelligence.

Subscribe to our newsletter
By subscribing you agree to with our Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.