CIS Logo
tagline: Confidence in the Connected World


Conducting your first cyber risk assessment can be intimidating. Learn how any organization can manage risk with CIS RAM.


CIS announced today the release of A Guide for Ensuring Security in Election Technology Procurements to help election officials understand and navigate the complex election procurement process.


The CIS Controls™ are a prioritized list of best practices that mitigate common attacks against systems and networks.


East Greenbush, NY April 17, 2019 CIS® (Center for Internet Security, Inc) announced today that it had been named a 2019 Top Workplace among



Thanks to positive survey responses from CIS employees, we were named a 2019 Top Workplace by the Albany Times Union. Learn how we did it!


East Greenbush, NY April 4, 2019 CIS® (Center for Internet Security, Inc) announces substantial enhancements to the CIS Controls™ in the new



Implementation Groups (IGs) are introduced in CIS Controls V7.1 They are a new prioritization for the CIS Controls, at the Sub-Control level.


This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls Version 7.1.


Discover the Sub-Controls in Implementation Groups that help organizations of different classes focus their security resources.


Standards in SCAP 2.0 can help achieve true security automation and improved security business practices by integrating support into products.


Learn how UMass Lowell’s cybersecurity training has helped students implement the NIST Framework and the CIS Controls.


The CIS Controls Mobile Companion Guide helps organizations implement security best practices for phones, tablets, and mobile apps.


CIS Controls Cloud Companion Guide helps organizations implement security best practices using CIS Controls V7 for phones, tablets, and mobile apps.


Easily track your progress of the CIS Controls Mobile Companion Guide with a downloadable spreadsheet.


John Gilligan, President & CEO of CIS, will testify at a hearing to examine the causes & scope of private sector data breaches.


1 2 3 9