White Papers
Download guides, security framework mappings, and other documents
Filter
273 Results Found
131 - 140 of 273 results
Published on 04.06.2022
Adopters of the CIS Controls should use this guide as a reference during activities such as implementation or auditing to verify that all in-scop...
CIS Controls
Published on 04.05.2022
The Spring 2022 issue of Cybersecurity Quarterly focuses on layered security and defense-in-depth.
Published on 03.28.2022
Scale is the most important consideration as industry transforms information security and assurance across our supply chains.
Published on 03.25.2022
Instruction for applying best practices to enterprise systems.
CIS Controls
Published on 03.11.2022
SLTT Perspectives to Inform the State and Local Cybersecurity Grant Program
MS-ISAC
Published on 03.07.2022
The methodology used to create the mapping can be useful to anyone attempting to understand the relationships between the CIS Controls and the CJ...
CIS Controls
Published on 02.10.2022
Part 2 highlights how the Russian government's influence in cybercrime impacts the SLTT community.
MS-ISAC
Published on 02.10.2022
Part 1 highlights the history of Russian governmental influence in cybercrime up to the present day.
MS-ISAC
Published on 02.10.2022
This page describes the methodology used to map the CIS Controls to the North American Electric Reliability Corporation-Critical Infrastructure P...
CIS Controls
Published on 02.04.2022
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps organizations impleme...
CIS Controls