Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

[Halloween Infographic] Scary Cyber Threats and Sweet Solutions

Do the words Zombiebots, Gh0st, Beast, and Creeper send shivers up your spine? They should.  These are the names of top malware that could be haunting your programs and email right now! Building a cyber defense plan may seem scary. What is even scarier, is not having systems in place to protect against malware and other cyber threats.

Cyber Threats That Frighten Even The Experts

It's not just malware that poses a threat to an enterprise's systems. Here is what scares some industry experts (and CIS team members!):

  • Kathleen Moriarty, Chief Technology Officer: The state of cyber threats is such that we need to pivot to built-in security models. The CIS Benchmarks serve as an excellent step toward providing the expected policies on systems that can be verified on a continuous basis in support of zero trust architectures.
  • Sean Atkinson, Chief Information Security Officer: A huge threat in cybersecurity is the misconfiguration of cloud infrastructure. It is scary to think that some think it is set-it-and-forget-it. In fact, it is necessary to monitor cloud instances for changes in access and integrity, and change or modify that infrastructure as needed.
  • Angelo Marcotullio, Chief Information Officer: The top security threat is all of us – the human. Not adhering to basic cybersecurity practices like strong passwords, setting permission levels for access, etc., can lead to a serious breach.
  • Curtis Dukes, Executive VP and GM, Security Best Practices: Real world data defines some of the biggest threats. The CIS Community Defense Model v2.0 explains the top attack types: Malware, Ransomware, Web Application Hacking, Insider Privilege and Misuse, and Targeted Intrusions.

Sweet Solutions to Cyber Threats

With all of these threats to consider, building a strong cybersecurity plan is more important than ever. While cybersecurity can be tricky, this infographic offers some treats in the way of tips and resources to help get things started.