Star 0

Abstract

As defenders, we have many resources: tools, technology, information, processes. But this leads to a cybersecurity “Fog of More”—more uncertainty about how to prioritize our actions. The Top 20 Critical Security Controls tackles this as a volunteer community problem—people and organizations from every part of the cyber ecosystem sharing information, taking action and supporting each other.