CIS Logo
tagline: Confidence in the Connected World


Organizations need to understand what information on their networks is sensitive, and encrypt it, or don't have it on the network in the first place.


Learn how you can catch up with CIS at RSA Conference 2020 and have the opportunity to talk about cybersecurity best practices and more.


Learn what it is like to be a Senior Cybersecurity Engineer working on the CIS Controls team at the Center for Internet Security.


CIS offers this white paper to help organizations understand the RABET-V process and develop mature, risk-informed software development practices.


Mobile, the Internet of Things (IoT) and the cloud have dissolved the traditional boundaries of the network. Organizations need to now approach network security from a more holistic and strategic viewpoint.


Ransomware attacks continue to be a major cyber threat for organizations of every size. Follow seven steps to help prevent and limit the impacts.


Hear from a few cyber thought leaders at CIS and learn what cybersecurity trends they're expecting to see in the new year.


CIS CISO, Sean Atkinson highlights 10 cybersecurity practices CISOs can fall prey to and what to do to avoid them in the futuire.


This document provides a detailed mapping of the relationships between the CIS Controls and NIST Special Publication 800-53 R4, "Security and Privacy Controls for Federal Information Systems and Organizations."


This document provides a detailed mapping of the relationships between the CIS Controls and NIST Special Publication 171 R2, "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations."


The Winter 2019 issue of Cybersecurity Quarterly covers everything from how to stop holiday scams to lifting up the new generation of cyber professionals.


While IT asset management is not a new field for IT professionals, the push to have an automated inventory for OT and control systems is a new phenomenon.


The CIS Controls Assessment Module helps organizations measure their application of the CIS Controls V7.1 Implementation Group 1 in Windows environments.


Through their implementation of security processes or technology, each person has demonstrated meaningful and measurable advances in security.


Hear from the prominent women who work at CIS and support our mission on a daily basis as they give career advice for women in tech.


1 2 3 14