CIS Insights

Explore trending articles, expert perspectives, real-world applications and more from the best minds in cybersecurity and IT.

CIS Controls Risk Assessment Method

Join our workshop to learn how to use CIS RAM 2.1 to help justify investments for reasonable implementation of IG2.

Register Now

Blog Posts

Keep up-to-date on emerging threats, vulnerabilities and practical advice from cybersecurity experts.

View All Blog Posts
Latest Blog Post10.02.20232022 NCSR: SLTTs Excel in Recovery Planning and MitigationRead Blog Post

Case Studies

See how organizations of all sizes are safeguarding IT systems against emerging threats.

View All Case Studies
Latest Case Study08.04.2023Building up Cyber Defenses in Compliance with State LawsView Case Study

Cybersecurity Spotlights

Explore our featured cyber threat intelligence articles, new research and advancements.

View All Spotlights
Latest Cybersecurity Spotlight09.25.2023Election Security Spotlight – Social Media SecurityRead Article

Newsletters

Read our monthly publication on timely and trending topics to improve your organization's cybersecurity.

View All Newsletters
Latest Newsletter02.21.2023Vishing and Smishing: What You Need to KnowRead Newsletter

Podcasts

Join Sean Atkinson and Tony Sager as they discuss trends and threats, and interview industry experts.

View All Podcasts
Latest Episode09.29.2023Episode 65: Making Cyber Risk Analysis Practical with QRAListen to Episode

Whitepapers

Learn about methodologies and strategies to keep your organization safe and secure.

View All White Papers
Latest Whitepaper09.28.2023Implementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1Read Whitepaper