All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1240 Results Found
Solutions
Industry
671 - 680 of 1240 results
Published on 09.17.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer Cyber-attacks are increasing in severity. Cybercriminals now use the supply chain, managem...
Published on 09.17.2021
Previously presented on Thursday, October 7th | 2:00 pm EDT The COVID-19 pandemic has fundamentally changed how land-management and community-dev...
MS-ISAC
Published on 09.10.2021
Cybersecurity Success Takes Soft Skills In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean Atk...
Published on 09.09.2021
The Center for Internet Security (CIS) is excited to sponsor and attend the Amazon Web Services (AWS) Public Sector Summit at booth 209. This yea...
CIS BenchmarksCIS Hardened Images
Published on 09.07.2021
The Center for Internet Security (CIS) launched CIS Controls v8 earlier this year. It was enhanced to keep up with evolving technology (modern sy...
CIS Controls
Published on 09.07.2021
Ensuring your organization’s IT environment is not only secure, but also patched regularly, can be challenging. Migrating to the cloud can help a...
CIS BenchmarksCIS Hardened Images
Published on 09.02.2021
The purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Critical Security Con...
CIS Controls
Published on 08.31.2021
The Top 5 Cybersecurity Tips for the Family In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean A...
MS-ISAC
Published on 08.31.2021
This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996...
CIS ControlsHealthcare
Published on 08.31.2021
This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.
CIS ControlsFinance
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More