Filter

271 Results Found

Solutions

Industry

131 - 140 of 271 results
Simplifying Security
Published on 03.28.2022
Scale is the most important consideration as industry transforms information security and assurance across our supply chains. 

CIS Controls v8 Cloud Companion Guide
Published on 03.25.2022
Instruction for applying best practices to enterprise systems.
CIS Controls

SLTT Input to the State and Local Cybersecurity Grant Program
Published on 03.11.2022
SLTT Perspectives to Inform the State and Local Cybersecurity Grant Program
MS-ISAC

CIS Controls v8 Mapping to Criminal Justice Information Services
Published on 03.07.2022
The methodology used to create the mapping can be useful to anyone attempting to understand the relationships between the CIS Controls and the CJ...
CIS Controls

From Russia…With Love? Part 2
Published on 02.10.2022
Part 2 highlights how the Russian government's influence in cybercrime impacts the SLTT community.
MS-ISAC

From Russia…With Love? Part 1
Published on 02.10.2022
Part 1 highlights the history of Russian governmental influence in cybercrime up to the present day.
MS-ISAC

CIS Controls v8 Mapping to NERC-CIP
Published on 02.10.2022
This page describes the methodology used to map the CIS Controls to the North American Electric Reliability Corporation-Critical Infrastructure P...
CIS Controls

CIS RAM (Risk Assessment Method)
Published on 02.04.2022
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps organizations impleme...
CIS Controls

CIS Controls v8 Privacy Companion Guide
Published on 01.27.2022
The purpose of the CIS Controls Privacy Guide is to develop best practices and guidance for implementing the CIS Critical Security Controls (CIS ...

Cybersecurity Quarterly Winter 2021
Published on 12.22.2021
The Winter 2021 issue of Cybersecurity Quarterly focuses on sharing resources and knowledge in the cybersecurity community, solving the challenge...
CIS BenchmarksCIS Controls

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions