CIS Logo
tagline: Confidence in the Connected World


Serving Cybercrime Victims
Friday May 29, 2020
Attendees will learn about resources to help consumers and SMBs report, recover, and reinforce their security after being impacted by cybercrime.


CIS provides a valuable framework for how state and local governments should be thinking about the basic elements of security for remote work.


Multiple vulnerabilities have been discovered in Apple iOS, iPadOS, and watchOS, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in iCloud for Windows, Safari, macOS, and Windows Migration Assistance.



This virtual training series, exclusively for our small business and SLTT members, provides step-by-step guidance to get the most out of CIS SecureSuite.


The report has some recommendations to keep your digital assets secure based on findings with the Center for Internet Security Critical Security Controls.


The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.


A vulnerability has been discovered in Cisco Unified Contact Center Express which could allow for remote code execution.



Verizon's Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches The information and analysis



What will really shape the future of cybersecurity is our collective decision-making about risk, and what we do about it.


Learn more about the 2020 Verizon DBIR and how the Center for Internet Security contributed by sharing best practice expertise.


This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.


CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.


Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.


Securing IoT devices and keeping personally identifiable information (PII) safe and secure these days is of the utmost importance.


1 2 3 122