x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Some policy veterans are raising concern that partnership and collaboration may be taking a backseat to ransomware regulation.


CIS president and CEO John Gilligan and CTO Kathleen Moriarty discuss the group’s current efforts and vision for the future.


Preventing unauthorized devices from gaining access to your network helps ensure the security of hardware devices and assets.


CIS research measures its cybersecurity recommendations’ effectiveness at thwarting the common techniques used in attacks.


CIS has resources available to businesses, municipalities, and governments across the U.S., free of charge.


The past couple years have seen ransomware rise to new heights of disruption, taking cities and critical infrastructure offline.


This “incentivizing” Act is similar to the Ohio Data Protection Act and the Utah Cybersecurity Affirmative Defenses Act.


This year’s CDM findings strongly reinforce the value of a relatively small number of well-chosen and essential defensive steps found in IG1.


The episode has been a reminder that there’s much work ahead for the Elections Infrastructure Information Sharing and Analysis Center.


So what can you do to make sure your remote employees are properly equipped to protect against cyberattacks?


In its DBIR 2021, Verizon explained that phishing continued its reign as one of the top Action varieties in breaches.


The Senate’s bill would throw a cybersecurity funding lifeline to government agencies.


As students settled in for an uncertain pandemic year lastyearr, ransomware attacks against K-12 accounted for 57% of all incidents reported to the MS-ISAC.


Companies that have greater confidence in security metrics are aggregating data from numerous sources to ensure a clean, correlated, and bias-free dataset.


The Senate is also negotiating passage of a $1 trillion infrastructure spending package, including $1 billion for a new cybersecurity grant program.


1 2 3 28