CIS Logo
tagline: Confidence in the Connected World


CIS has developed the Election Infrastructure Assessment Tool (EIAT), a program to help your agency conduct an election security self-assessment.


This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.


The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide helps users secure computers running Microsoft Windows 10 when implementing the CIS Sub-Controls.


This document contains examples of methods for tracking hardware, software, and sensitive information in an



Learn more about the CIS Controls Microsoft Windows 10 Cyber Hygiene Guide which offers practical guidance on cyber hygiene for Windows 10 users.


The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide offers practical guidance on cyber hygiene for Windows 10 users


The National Governor's Association announced a partnership to help states and territories mitigate new cybersecurity threats in public and private systems.


CIS releases the CIS Controls Internet of Things Companion Guide


Learn how your organization can implement CIS Controls for Internet of Things (IoT) devices including smart thermostats, window sensors, and headsets.


Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your process of securing IoT devices.


The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Controls to IoT devices.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows 10 environments.


Learn how one of our CIS Controls Community members volunteers his time to improve cybersecurity for organizations around the world.


Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.


Conducting your first cyber risk assessment can be intimidating. Learn how any organization can manage risk with CIS RAM.


1 2 3 11