All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1234 Results Found

Solutions

Industry

961 - 970 of 1234 results
If You Build it They Will Comply: Getting the Most Out of Cybersecurity Policy Templates
Published on 08.26.2019
This event has already occurred.
Friday, September 13, 2019 | 2:00 PM EDT Looking for a way to quickly improve your security? Do you want to increase your compliance scores? Woul...

2019 Nationwide Cybersecurity Review (NCSR)
Published on 08.26.2019
This event has already occurred.
Friday, September 20, 2019 | 2:00 PM EST Join the MS-ISAC team as they provide an overview of what the Nationwide Cybersecurity Review is and to ...
MS-ISAC

Public Sector Cyber Defense Guide
Published on 08.18.2019
Organizations rely on different cybersecurity products and services to help bolster their defenses. By comparing available services with best pra...
MS-ISAC

Election Security Spotlight – Top-Level Domains (TLD)
Published on 08.16.2019
What it is: A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediate...

Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Published on 08.15.2019
Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...
CIS BenchmarksCIS Hardened Images

Learn about CIS Controls Implementation Groups and the Controls Assessment Module
Published on 08.14.2019
This event has already occurred.
Thursday, August 29, 2019 | 2:00 PM, EDT The CIS Controls Implementation Groups (IG) are self-assessed based on your organization’s resources and...
CIS ControlsMS-ISAC

Build Kits Speed Implementation of Secure Configurations
Published on 08.13.2019
Secure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...
CIS BenchmarksCIS SecureSuite

A Day in the Life of an Information Security Senior Auditor
Published on 08.06.2019
Being an Information Security Senior Auditor brings different challenges every day. Whether she’s helping conduct assessments or evaluating risk ...
CIS Controls

Ransomware Impacts and Defense Controls
Published on 07.31.2019
When data is the lifeblood of your organization, ransomware hits like a heart attack. Are you prepared? Ransomware is a type of malware that bloc...
CIS Controls

CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001
Published on 07.16.2019
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions