Filter by Topic

219 Results Found
11 - 20 of 219 results
2022 Nationwide Cybersecurity Review Summary Report
Published on 11.01.2023
2022 Nationwide Cybersecurity Review Summary Report
The 2022 NCSR Summary Report helps SLTT decision makers understand their risk tolerance and maturity. Explore our findings today.

Ransomware Defense-in-Depth
Published on 10.10.2023
Ransomware Defense-in-Depth
This guide explores how SLTTs can mitigate the threat of ransomware using a defense-in-depth strategy as members of the MS- and EI-ISACs.

Cybersecurity Quarterly Fall 2023
Published on 10.10.2023
Cybersecurity Quarterly Fall 2023
The Fall 2023 issue of Cybersecurity Quarterly focuses on providing you with some recommendations on how to protect your organization from cyber ...

Implementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1
Published on 09.28.2023
Implementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1
This guide helps SME to fast-track their adoption of IG1 of the CIS Controls, thereby rapidly strengthening their cyber defenses.

2023 Kids Safe Online Activity Book
Published on 09.21.2023
2023 Kids Safe Online Activity Book
The MS-ISAC has released its 2023 book of cybersecurity activities for students to help them stay safe and secure online.[…]

The Cost of Cyber Defense: CIS Controls IG1
Published on 08.03.2023
The Cost of Cyber Defense: CIS Controls IG1
The Cost of Cyber Defense: Implementation Group 1 (IG1) shows how realistic and cost effective it can be for you to achieve essential cyber hygie...

How to Plan a Cybersecurity Roadmap in 4 Steps
Published on 07.28.2023
How to Plan a Cybersecurity Roadmap in 4 Steps
CIS SecureSuite Membership includes everything you need to plot a cybersecurity roadmap. Download our white paper to learn more.

Cybersecurity Quarterly Summer 2023
Published on 07.14.2023
Cybersecurity Quarterly Summer 2023
The Summer 2023 issue of Cybersecurity Quarterly focuses on preventative security, or actionable steps that you can take to reduce your attack su...

MS-ISAC Guide to DDoS Attacks
Published on 05.24.2023
MS-ISAC Guide to DDoS Attacks
In this guide, the MS-ISAC discusses methods and techniques which CTAs use to generate a DDoS attack. It also recommends how to defend against a ...

Internet of Things: Embedded Security Guidance
Published on 05.17.2023
Internet of Things: Embedded Security Guidance
Our whitepaper helps IoT vendors provide embedded security on their devices by establishing a framework for protocol standards across constrained...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions