MAmbassadorMark EgglestonChief Information Security OfficerUnited StatesVerified Community AmbassadorJoin / Sign In to ConnectContent Mark is FollowingDoes your organization have a structured approach to address insider risk?Risk ManagementSecurity Strategy & Roadmap+2 moreYesNoUnsureOther (please share below!)View Results3.1k viewscircle iconLightbulb on1 UpvoteLightbulb offUpvoteConversationCommentSaveSaveShareShareWhat have you used to ensure that you have MFA on all externally facing systems and IT services?Security Strategy & RoadmapSecurity & GRC+1 moreMMark EgglestonChief Information Security Officer in Finance (non-banking)a year agoGreat question, top of mind, I'd suggest:1) Review your Application Inventory and assign App Owner validates MFA (test script or screen shots of config are ideal); an2) perform a pen test either internally via peer ...read moreLightbulb offUpvotereply-iconCommentRead More Comments500 viewscircle iconLightbulb on1 Upvotecircle icon4 CommentsLightbulb offUpvoteConversationCommentSaveSaveShareShare
1) Review your Application Inventory and assign App Owner validates MFA (test script or screen shots of config are ideal); an
2) perform a pen test either internally via peer ...read more