×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



This podcast episode host Tony Sager and guest Brian de Vallance explain that technology is not wizardry and about government and technical experts working together to create universal cybersecurity policy.


Begin to implement a Zero Trust strategy using the CIS Controls v8 to improve the security of IT environments as demonstrated over time by reduced attacker dwell time.


Zero trust is an important information security architectural shift and attestation can provide system-level remediation and resiliency.


The law takes effect on Oct. 1 and makes Connecticut the third state after Ohio and Utah to provide such incentives for implementing cyber frameworks.


Bill includes the use of the CIS Critical Security Controls as part of a reasonable cybersecurity program HARTFORD, Conn, July 12, 2021 –



Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center for Internet Security.


Businesses that follow one of the approved frameworks will have an “affirmative defense” against claims that a breach was the result of a “failure to implement reasonable cybersecurity controls.”


Recent Day One attacks have demonstrated how difficult it can be for organizations to react when vulnerabilities are announced.


Hosts Todd Fitzgerald and Tony Sager discuss CIS Controls v8, as well as ways of mitigating ransomware and other SMB cybersecurity threats.


Employees returning to the office will need cybersecurity awareness training. The SANS Summer Buy Window offers awareness training to SLTTs at a discount.


Information security governance helps mitigate risk and helps with guidance for security and compliance.


CIS has developed guidance to help enterprises mitigate the risk of attacks on exploitable protocols such as Server Message Block (SMB).


Download this guide for direct mitigations for SMB, as well as which best practices an enterprise can put in place to reduce the risk of an SMB-related attack. 


Part 2 of a 2-part series where we discuss first impressions of the CIS Controls v8 launch and feedback from the community.


The goal of CIS Controls V8 is to provide practical and specific actions that can spark creation of a better network security environment.


1 2 3 24