Course Summary

Anyone who has tried to implement the CIS Controls v8 knows there are challenges and obstacles in doing so. Should you proceed in order? What if you aren’t able to complete a particular control group? What if you encounter a technical problem?

Jason Sgro, Senior Partner with The ATOM Group, believes that implementation of the CIS controls is an important step in making your organization more secure, regardless of the order. Join us to learn his preferences, recommendations, and guidance to be shared with local government IT directors, IT staff, and managed service providers.

Municipal IT Series - Control 9: Email and Web Browser Protections

Anyone who has tried to implement the CIS Controls v8 knows there are challenges and obstacles in doing so.

November 9, 2021

10:00am to 11:00am

Municipal IT Series - Control 3: Data Protection

Anyone who has tried to implement the CIS Controls v8 knows there are challenges and obstacles in doing so.

December 14, 2021

10:00am to 11:00am

Municipal IT Series - Control 10: Malware Defenses

Anyone who has tried to implement the CIS Controls v8 knows there are challenges and obstacles in doing so.

January 11, 2022

10:00am to 11:00am

About Jason

Jason J. Sgro - Jason currently serves as Sr. Partner and Chief Strategist for The ATOM Group, a software development and cybersecurity agency in Portsmouth, NH. Jason has spent the last decade consulting in the healthcare space and is currently the Sr. Advisor for cybersecurity to the New Hampshire State Legislature and the Validation Institute, an independent company validating medical claims throughout the United States. Previously, Jason spent nearly 10 years working for Hewlett-Packard and FCI serving both the private and public sectors. In 2018 he founded the Build for Trust Organization, a not-for-profit which specializes in educating leaders about the social responsibility of security by design.

bio and logo

Technical Requirements: Each participant needs to be able to access and navigate in an online Zoom environment requiring internet access, an email address, and the ability to function in a secure virtual meeting platform.