home_banner `

Content Icon

Critical Security Controls (CSC) 20 Master Mapping Tool (Updated)

October 1, 2018 | Tools & Templates | Enterprise and IT Compliance Management

Understanding and managing different security frameworks can be a daunting task. This tool offers a detailed matrix for mapping the CSC 20 to a number of different frameworks, including the NIST CSF, ISO 27002, NSA MNT and many more. 


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

59% of Organizations Currently Meet GDPR Requirements

More than half (59%) of organizations indicate they are meeting all or most of GDPR’s requirements today. Another 29 percent said they expect to be GDPR ready in 2020, while 9 percent said it would still take another year+ to gain compliance.

GDPR, CCPA, NYDFS and PIPEDA: Understand the Regulatory Differences

How are GDPR, CCPA, 23 NYCRR 500 and PIPEDA the same, and how are they different? In this Ask-an-Expert written response, IANS Faculty Rebecca Herold explains the regulations, and offers tips for assessment and compliance.

Poll: Best Ways to Encourage PAM Tool Usage

What statements or phrases can help increase adoption of tools like Thycotic Secret Server? In this Viewpoints report, IANS Faculty Josh More, Adam Shostack and Jason Gillam offer some tried-and-true strategies.

Information Security Job Description Templates (Updated)

With the information security workforce shortage projected to reach 2-3 million over the next few years, organizations are putting a greater emphasis on their recruiting process to better fill out their security teams. Use these sample infosec job descriptions to set the foundation for role expectations and attract the most highly qualified professionals to your organization.