Case Studies
Hear from the experts how they use CIS resources to create confidence the connected world
Filter by Topic
38 Results Found
1 - 10 of 38 results
Published on 08.04.2023
Building up Cyber Defenses in Compliance with State LawsHere's how one CISO used the CIS Controls to build up his school district's cyber defenses in compliance with state laws.
Published on 12.21.2022
Upholding Cloud Security with Less Effort, More ConsistencyIn this case study, we explore a means for your your organization to uphold cloud security while saving both time and money.
Published on 06.10.2022
How CIS SecureSuite Drives New Revenue Opportunities for Service ProvidersDewpoint Inc. Uses CIS SecureSuite Membership to Drive New Revenue Opportunities
Published on 08.02.2021
CIS SecureSuite helps new CISO rapidly achieve SOC 2 complianceA new CISO used a CIS SecureSuite Membership to quickly and effectively implement security controls in preparation for a SOC 2 audit.
Published on 06.30.2020
Washington State Auditor’s Office uses CIS Controls to Perform Effective Security AuditsWashington State Auditor’s Office uses the CIS Controls to perform security audits and improve the security posture of state agencies & local gov...
Published on 04.07.2020
Tackling Audits and Cloud Security Efficiently and at ScaleLearn how the State of Minnesota leverages CIS SecureSuite Membership to implement cybersecurity best practices like the CIS Benchmarks.
Published on 03.11.2020
How One School District Enhances Cyber Hygiene with the CIS ControlsLearn how New Hampshire Hillsboro-Deering School District enhances cyber hygiene by implementing the CIS Controls Implementation Group 1.
Published on 02.19.2020
How to Choose a Cybersecurity Consultant: What are their Security Best Practices?Learn how one cybersecurity consulting organization uses the security best practices of CIS SecureSuite to help clients defend against cyber thre...
Published on 01.24.2020
Identifying Suspicious Election Network Activity with AlbertMarion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.
Published on 01.08.2020
From the Ground Up: How CIS Best Practices Helped Build A Cybersecurity Consulting AgencyLearn how one cybersecurity consulting organization uses the CIS SecureSuite Membership resources to help clients defend against cyber threats.
Explore Related Cybersecurity Solutions
Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More