All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

764 Results Found
Searching ...
What SLTTs Should Know About the FREE CIS SecureSuite Membership blog graphic
Published on 05.25.2022
What SLTTs Should Know About the FREE CIS SecureSuite Membership
CIS has made CIS SecureSuite Membership free to SLTT governments in the United States. Learn how this can help you revamp your organization's cyb...
Defining "Reasonable" Security with a Risk Assessment Method blog graphic
Published on 05.20.2022
Defining Reasonable Security with a Risk Assessment Method
Enterprises can use CIS RAM v2.1 for IG3 to demonstrate that a risk is reasonable upon experiencing a breach.
Published on 05.20.2022
Episode 31: To Achieve ICS Security Today, Look to Yesterday
Sean Atkinson and Karen Sorady discuss ICS security, the threats involved, and tips for making a good OT security program.
CIS Will be back at RSA Conference in 2022 blog graphic
Published on 05.19.2022
CIS Will Be Back at RSA Conference in 2022
For many of us, it was the last in-person industry event we attended before COVID. I'm happy to say that CIS will be back at RSA Conference this ...
CIS RAM v2.1 for Implementation Group 3 (IG3) Workshop webinar graphic
Published on 05.18.2022
CIS RAM v2 1 for Implementation Group 3 IG3 Workshop
The CIS RAM v2.1 for IG3 workshop will provide a step-by-step tutorial of the activities an IG3 enterprise will take to conduct a risk assessment...
Getting to Know the CIS Benchmarks blog graphic
Published on 05.17.2022
Getting to Know the CIS Benchmarks
There are many ways for you to get involved in the development process of the CIS Benchmarks and to use a Benchmark's security recommendations....
How to Get up and Running with CIS WorkBench blog graphic
Published on 05.12.2022
How to Get Up and Running with CIS WorkBench
Communities are at the heart of what CIS is all about. That's what led us to create CIS WorkBench. Read on to learn how this collaborative hub wo...
Winning Posters for 2022
Published on 05.12.2022
Winning Posters for 2022
We at the MS-ISAC are overjoyed to announce this year’s winning Kids Safe Online poster designs!
CIS Controls v8 Mapping to FFIEC CAT white paper graphic
Published on 05.10.2022
CIS Controls v8 Mapping to FFIEC CAT
This document contains mappings of the CIS Controls v8 Mapping to FFIEC CAT
Published on 05.06.2022
Episode 30: Solving Cybersecurity at Scale with Nonprofits
Today, the resources and expertise of nonprofits mean that enterprises don't need to solve cybersecurity issues on their own.

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions