title | description | published | date | tags | editor | dateCreated |
---|---|---|---|---|---|---|
BENTO:GUIDES:HOME |
Welcome to BENTO:GUIDES, the cybersecurity information source for clients and guests. |
true |
2022-02-27 21:15:50 UTC |
welcome, bronze |
markdown |
2020-08-05 17:54:57 UTC |
The objective behind Bento Cyber Security Framework (BCSF) is to promote realistic and practical controls against common threats to organizational infrastructure. BCSF will help you create an information security program that is based on standards and adapts to your organization's needs. BENTO:GUIDES is the tool for learning about, developing, and maintaining your BCSF-based information security program. The tool gives you access to a collection of materials which you can use to build your own program.
BENTO:GUIDES information security content and management platform for professional service companies. To get started, begin with our learning modules and educate yourself about cyber security for small companies. From there, use our tiered content to build a security program by adopting policies, developing controls, and eventually attesting it all works properly by auditing and tracking evidence.
{.grid-list}
- Bento Cyber Security Framework A policy framework of computer security guidance for how small & medium sized comapnies can assess and improve their ability to prevent, detect, and respond to cyber attacks.
- Bento Cyber Security Framework Guides Library of articles, guides, policies, and procedures that educates and instructs how companies can implement cyber security strategy and processes based on BCSF. {.links-list}
These modules are part of the Bronze subscription to BentoSecurity and available to everyone. Written for owners, board members, managers, system administrators, and emploees, the modules cover a plethora of cyber security information.
{.is-info}
{.grid-list}
- Introduction to BCSF Bronze Level access to all core content.
- Learning and Training Simple and advanced immersion to your responsibility.
- Policies for Information Security This is the heart of an information security program.
- Implementation Checklists Outlines for your actionable steps
- Guidance and Controls Detailed implementation and oversight guidance {.links-list}