CIS Logo
tagline: Confidence in the Connected World

The CIS Controls Implementation Groups provide a simple and accessible way to help organizations of different classes focus their security resources.

The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 election.

We need to focus more effort on, because it is where the highest risk of a breach will originate from, is within an organisation.

CIS remains committed to keeping our Members secure on the home front amidst concerns that cybercriminals are exploiting disruptions caused by COVID-19.

Get a closer look at how the CIS Controls and CIS Benchmarks consensus-based resources plug in to other security frameworks.

The  coronavirus epidemic is prompting companies to allow their employees to work from home or telecommute. Home IT devices are still subject to threats.

Discover five high impact actions telecommuters can take to enhance their network security to keep data safe and stay productive.

Learn how New Hampshire Hillsboro-Deering School District enhances cyber hygiene by implementing the CIS Controls Implementation Group 1.

Learn how to better prepare for your next cybersecurity compliance audit with the consensus-developed resources from CIS.

Catch up on CIS’s activities from RSA 2020, including recognition for cybersecurity contributions and presenting on election security.

Organizations need to understand what information on their networks is sensitive, and encrypt it, or don't have it on the network in the first place.

Learn how you can catch up with CIS at RSA Conference 2020 and have the opportunity to talk about cybersecurity best practices and more.

Learn what it is like to be a Senior Cybersecurity Engineer working on the CIS Controls team at the Center for Internet Security.

CIS offers this white paper to help organizations understand the RABET-V process and develop mature, risk-informed software development practices.

Mobile, the Internet of Things (IoT) and the cloud have dissolved the traditional boundaries of the network. Organizations need to now approach network security from a more holistic and strategic viewpoint.

1 2 3 15