Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

CIS Controls Internet of Things (IoT) and Mobile Companion Guides for CIS Critical Security Controls v8 was released to support the demand from evolving technology (modern systems and software), threats, and even the changes in the workplace.

In its DBIR 2021, Verizon explained that phishing continued its reign as one of the top Action varieties in breaches.

The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Critical Security Controls v8 to IoT devices.

This document contains mappings of the CIS Controls and Safeguards to Payment Card Industry (PCI) Data Security Standard, v3.2.1.

This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996

This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.

Podcast hosts Tony Sager and Sean Atkinson talk about what they like and dislike about the cybersecurity industry.

Companies that have greater confidence in security metrics are aggregating data from numerous sources to ensure a clean, correlated, and bias-free dataset.

This podcast episode host Tony Sager and guest Brian de Vallance explain that technology is not wizardry and about government and technical experts working together to create universal cybersecurity policy.

Begin to implement a Zero Trust strategy using the CIS Controls v8 to improve the security of IT environments as demonstrated over time by reduced attacker dwell time.

With the introduction of IGs in v7.1 and the changes in v8, the CIS Controls offer the best/easiest path to good cyber hygiene for smaller organizations.

Zero trust is an important information security architectural shift and attestation can provide system-level remediation and resiliency.

The law takes effect on Oct. 1 and makes Connecticut the third state after Ohio and Utah to provide such incentives for implementing cyber frameworks.

Bill includes the use of the CIS Critical Security Controls as part of a reasonable cybersecurity program HARTFORD, Conn, July 12, 2021 –

Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center for Internet Security.

1 2 3 24