Automated Compliance: The Byproduct of Holistic Hardening

Tuesday, July 29, 2025, at 2:00 P.M. ET

The regulatory environment continues to grow in complexity. Different U.S. states have different data privacy statutes, while most businesses must also meet national, international, and sector-specific standards. All these regulatory levels complicate your compliance efforts, raising the risk of wasted time and duplicate effort.

Fortunately, you can achieve automated compliance for your organization using resources from the Center for Internet Security® (CIS®).

By attending this webinar, you’ll learn:

  • How the CIS Benchmarks® simplify your compliance tasks by mapping to and/or being referenced by numerous frameworks and standards
  • How you can simply spin up built-in compliance within the cloud using CIS Hardened Images®
  • How CIS SecureSuite® Membership comes with tools for automatically deploying, hardening, and evaluating your systems against the Benchmarks, thus aiding your compliance efforts
Register for Webinar

About Our Presenters

Sean Atkinson
Chief Information Security Officer

Sean Atkinson

Sean Atkinson is Chief Information Security Officer of CIS. He uses his broad cybersecurity expertise to direct strategy, operations, and policy to protect CIS’s enterprise of information assets. His job responsibilities include risk management, communications, applications, and infrastructure. Prior to CIS, Sean served as the Global Information Security Compliance Officer for GLOBALFOUNDRIES, serving Governance, Risk, and Compliance (GRC) across the globe.

Prior to GLOBALFOUNDRIES, Sean led the security implementation for the New York State Statewide Financial System (SFS) implementation from 2007 to 2014. His last role and responsibility was as the Internal Control, Risk, and Information Security Manager.

 

Kevin Garnier
Cybersecurity Solutions Engineer

Kevin Garnier headshot

Over 25 years in assisting organizations of all sizes with reducing their attack surface and risk mitigation, focusing on cybersecurity control frameworks; Cyber Risk Assessment Audits and Vulnerability Management, Cybersecurity Frameworks: CIS Critical Controls v 8.1, NIST CSF, ISA 62443, Compliance standards: SOC 2, GDPR, HIPAA, ISO27001, and US FedRAMP.