See how you can leverage the Center for Internet Security (CIS) checklist to meet industry regulations and keep your Mac environment secure.
CIS Checklist: How to Secure macOS like a Pro
The Center for Internet Security (CIS), a well-known independent organization, provides a recommended checklist for best securing macOS. Widely considered the standard in the security industry, organizations that adhere to the CIS checklist reduce the risk of vulnerabilities and maximize the protection of their computers and infrastructure. So how do organizations ensure they are implementing the guidelines correctly?
In our webinar, CIS Checklist: How to Secure macOS like a Pro, we’ll explain how organizations can leverage and put to use the CIS checklist recommendations — in conjunction with Jamf Pro — to meet industry regulations and keep their Mac environment secure.
- An overview of the CIS checklist and why it’s important
- Ways to accomplish specific tasks outlined in the security checklist
- The impact on users when Macs are properly secured
- Other security standards in the industry and how to meet them