See you again next year!

Register now

CIS Controls® masterclass

Three-part series

With the number of cyberattacks on the rise, organizations today should look for a well-structured security plan to improve their cyberdefense strategy. The CIS Controls are a prescriptive, prioritized, and simplified set of cybersecurity best practices and defensive actions that help support compliance in this multi-framework era. Formulated by a group of IT experts at the Center for Internet Security (CIS) using information gathered from actual attacks and their effective defenses the CIS Controls comprise of 18 cyberdefense recommendations surrounding organizational internet security.

About this masterclass

The latest version of the CIS Controls focuses on Implementation Groups (IGs). IGs are self-assessed categories for enterprises aimed at prioritizing the implementation of the CIS Controls. In an effort to assist enterprises of every size, IGs are divided into three groups. They are based on the risk profile of an enterprise and the resources available to it to implement the CIS Controls.Each IG identifies a set of Safeguards (previously referred to as CIS Sub-Controls) that the enterprise needs to implement. There are a total of 153 Safeguards in CIS Controls Version 8.


Session img Play button
Episode 1

Implementation group 1

IG1 focuses on basic cyberhygiene. It is comprised of the foundational set of cyberdefense Safeguards that every enterprise should apply to guard against the most common attacks. Small to medium-sized organizations with limited cybersecurity expertise and low-sensitivity data will need to implement the cyberdefense Safeguards that typically fall into the IG1 category.

Session img Play button
Episode 2

Implementation group 2

Organizations with moderate resources (employing individuals responsible for managing and protecting IT infrastructures) and greater risk exposure from handling more sensitive assets and data will need to implement the IG2 controls along with IG1. These controls focus on helping security teams manage sensitive client or company information.

Session img Play button
Episode 3

Implementation group 3

Mature organizations with significant resources (employing security experts that specialize in the different facets of cybersecurity) and high risk exposure from handling critical assets and data need to implement the Safeguards under the IG3 category along with IG1 and IG2. Safeguards selected for IG3 abate targeted attacks from sophisticated adversaries and reduce the impact of zero-day attacks.


Speaker details


Sathish Sagayaraj Joseph

Technical expert and manager of strategic account management

Sathish is backed by 14 years of expertise in enterprise IT management and has engaged with clients from diverse socioeconomic and cultural backgrounds to define their IT needs. His vast experience comes from more than 100 enterprise implementations centered on help desk, monitoring, endpoint management, and IT security solutions. He currently serves as the manager for the strategic account management team (North America) at ManageEngine, offering consulting services to enterprises in many industries. Sathish focuses on clearly identifying an organizations' IT needs and helping his clients achieve their organization's unique IT management goals.

Subscribe to ManageEngine Newsletter

By clicking 'Subscribe', you agree to processing of personal data according to the Privacy Policy.


Disclaimer: The complete implementation of the CIS Controls® (developed by the Center of Internet Security) requires a variety of solutions, processes, people, and technologies. This webinar discusses some of the ways in which IT management tools can help with the CIS Control requirements. Coupled with other appropriate solutions, processes, and people, ManageEngine's solutions help implement the CIS Controls. This webinar is for informational purposes only, and should not be considered as legal advice for the CIS Controls implementation. ManageEngine makes no warranties, express, implied, or statutory, as to the information in this material.


Please fill the form to access the video.

popup close

Please select country

Please enter code given below in a picture.

By clicking 'Submit', you agree to processing of personal data according to the Privacy Policy.

popup close
X success
popup close

Thank you for registering for the webinar.

You will receive a confirmation email from us shortly with all the details.
(In case you're unable to find the email, please check your spam folder)

Thank you for registering. Please check your email for more information.