x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



CIS Chief Product Architect discusses how the Open Security Alliance helps enable the cooperative ecosystem.


Philippe Langlois co-author of the Verizon DBIR joins the podcast in celebration of Cybersecurity Awareness Month to discuss why the DBIR and CIS Community Defense Model (CDM) provide a more holistic picture of cybersecurity.


Preventing unauthorized devices from gaining access to your network helps ensure the security of hardware devices and assets.


CIS Controls, now CIS Critical Security Controls, Tony Sager, CIS Senior Vice President and Chief Evangelist explains why.


CIS research measures its cybersecurity recommendations’ effectiveness at thwarting the common techniques used in attacks.


This “incentivizing” Act is similar to the Ohio Data Protection Act and the Utah Cybersecurity Affirmative Defenses Act.


This year’s CDM findings strongly reinforce the value of a relatively small number of well-chosen and essential defensive steps found in IG1.


Download the Community Defense Model (CDM) v2.0 to design, prioritize, implement, and improve your cybersecurity program against the most prevalent types of attacks.


The Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program based on currently available threat data from industry reports.


The model shows that the CIS Controls defend against approximately 86% of all ATT&CK (sub-)techniques found in the MITRE ATT&CK® framework.


In this podcast, learn why vendors and consultants should offer software with built-in cybersecurity as a safer alternative to updating vulnerabilities with patches.


CIS Controls Internet of Things (IoT) and Mobile Companion Guides for CIS Critical Security Controls v8 was released to support the demand from evolving technology (modern systems and software), threats, and even the changes in the workplace.


In its DBIR 2021, Verizon explained that phishing continued its reign as one of the top Action varieties in breaches.


The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Critical Security Controls v8 to IoT devices.


This document contains mappings of the CIS Controls and Safeguards to Payment Card Industry (PCI) Data Security Standard, v3.2.1.


1 2 3 24