CIS Logo
tagline: Confidence in the Connected World


Dealers who aren’t sure where to start, or who want to proactively evolve their IT before they’re forced to, should start with the first five CIS controls.


This blog post will highlight the development process for establishing a cyber hygiene program and help identify a program that works for your organization.


Discover how the team at CIS and our partners worked to improve cybersecurity during 2019’s National Cybersecurity Awareness Month.


11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.


Cybersecurity relies on specialists of every kind to achieve success. It takes a team in order to avoid the pitfalls of cyber vulnerabilities and attacks.


Check out six simple tips to discover how to keep your workplace safe online, to improve your organization's cybersecurity defense and minimize risk.


The CIS Security Best Practices for Non-Voting Election Technology provides cybersecurity recommendations for supporting election technology.


The CIS Critical Security Controls list has been the gold standard for security defense advice. These are the tasks you should do first.


Learn how the CIS Controls and related tools can help organization s around the world build an “on-ramp” to better cyber defenses.


NIST OLIR Submission V1
September 9, 2019
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format. 


The guide includes a network security checklist, and also shows users how to map security configurations to the CIS Controls.


Our hardworking CIS Controls team has released a new guide to help teleworkers and small offices implement cybersecurity best practices.


The Telework and Small Office Network Security Guide is meant to assist in securing commodity routers, modems, and other network devices.


This webinar highlights Implementation Group 1, which can help enhance cyber hygiene along with how to measure application in Windows 10 environments.


Implementation of either STIG or CIS Benchmarks can be a challenge if the process isn’t somewhat automated, due to the disparate requirements.


1 2 3 13