Filter

273 Results Found
131 - 140 of 273 results
Guide to Enterprise Assets and Software
Published on 04.06.2022
Adopters of the CIS Controls should use this guide as a reference during activities such as implementation or auditing to verify that all in-scop...
CIS Controls

Cybersecurity Quarterly Spring 2022
Published on 04.05.2022
The Spring 2022 issue of Cybersecurity Quarterly focuses on layered security and defense-in-depth.

Simplifying Security
Published on 03.28.2022
Scale is the most important consideration as industry transforms information security and assurance across our supply chains. 

CIS Controls v8 Cloud Companion Guide
Published on 03.25.2022
Instruction for applying best practices to enterprise systems.
CIS Controls

SLTT Input to the State and Local Cybersecurity Grant Program
Published on 03.11.2022
SLTT Perspectives to Inform the State and Local Cybersecurity Grant Program
MS-ISAC

CIS Controls v8 Mapping to Criminal Justice Information Services
Published on 03.07.2022
The methodology used to create the mapping can be useful to anyone attempting to understand the relationships between the CIS Controls and the CJ...
CIS Controls

From Russia…With Love? Part 2
Published on 02.10.2022
Part 2 highlights how the Russian government's influence in cybercrime impacts the SLTT community.
MS-ISAC

From Russia…With Love? Part 1
Published on 02.10.2022
Part 1 highlights the history of Russian governmental influence in cybercrime up to the present day.
MS-ISAC

CIS Controls v8 Mapping to NERC-CIP
Published on 02.10.2022
This page describes the methodology used to map the CIS Controls to the North American Electric Reliability Corporation-Critical Infrastructure P...
CIS Controls

CIS RAM (Risk Assessment Method)
Published on 02.04.2022
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps organizations impleme...
CIS Controls

Explore Related Cybersecurity Solutions

See All Solutions