Case Studies
Hear from the experts how they use CIS resources to create confidence the connected world
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

40 Results Found
11 - 20 of 40 results
Identifying Suspicious Election Network Activity with Albert
Published on 01.24.2020
Identifying Suspicious Election Network Activity with Albert
Marion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.

From the Ground Up: How CIS Best Practices Helped Build A Cybersecurity Consulting Agency
Published on 01.08.2020
From the Ground Up: How CIS Best Practices Helped Build A Cybersecurity Consulting Agency
Learn how one cybersecurity consulting organization uses the CIS SecureSuite Membership resources to help clients defend against cyber threats.

National Bank Relies on Industry-Recommended Cybersecurity Best Practices
Published on 12.30.2019
National Bank Relies on Industry-Recommended Cybersecurity Best Practices
Learn how one financial institution uses the cybersecurity best practices included in CIS SecureSuite Membership to bolster their cyber defenses.

How CloudCheckr Optimizes for Security With CIS
Published on 05.23.2019
How CloudCheckr Optimizes for Security With CIS
When optimizing cloud environments, CloudCheckr knows that security has to be implemented from the start. That’s why they recommend CIS Hardened ...

CIS Hardened Images Help Anitian Automate FedRAMP Compliance
Published on 04.16.2019
CIS Hardened Images Help Anitian Automate FedRAMP Compliance
Organizations providing cloud solutions to the U.S. government must comply with FedRAMP. CIS Hardened Images help Anitian automate FedRAMP compli...

UMass Lowell’s Cybersecurity Program Builds on CIS Controls
Published on 03.28.2019
UMass Lowell’s Cybersecurity Program Builds on CIS Controls
Learn how UMass Lowell’s cybersecurity training has helped students implement the NIST Framework and the CIS Controls.

Worldwide Outdoor Retailer Uses the CIS Controls as Primary Framework
Published on 10.01.2018
Worldwide Outdoor Retailer Uses the CIS Controls as Primary Framework
"Where we get the biggest bang for our buck is in the CIS Controls. They help up to prioritize the other compliance frameworks."

Infralert Uses the CIS Controls for Remediation and Planning
Published on 09.12.2018
Infralert Uses the CIS Controls for Remediation and Planning
Learn why the CIS Controls are a good starting point for cybersecurity remediation.

Oklahoma City and the CIS Controls
Published on 09.07.2018
Oklahoma City and the CIS Controls
Learn how Oklahoma City uses the CIS Controls to address their cybersecurity challenges.

CommunityForce Uses CIS Hardened Images for its Customers
Published on 08.21.2018
CommunityForce Uses CIS Hardened Images for its Customers
CIS Hardened Images are helping one software and technology firm deliver cloud-based process management solutions to over 300 organizations world...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions