URGENT MESSAGE: Log4j Zero-Day Vulnerability Response| Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Chain of custody also applies to digital materials such as electronic transmissions or records.

Ransomware is a type of malicious softwarethat limits or blocks access to a system or data. Attackers who use ransomware will demand some form of payment to remove the malware.

Election offices can benefit from security assessments to prevent cyberattacks, meet national standards, and gain voter trust.

A VDP allows an organization to develop a mitigation plan or patch the vulnerability before it is exploited by malicious actors.

Election offices with resource constraints can especially benefit from using the MSP model. The cost and scalability of MSPs allow offices with a limited IT staff to access services that may be challenging to implement with a small IT team.

In some cases, no one person or organization has control over open source code and therefore the user would not have any assurances of the reliability and security of the code.

Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endpoints.”

Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote network on an untrusted connection. This ensures that all transmitted data remains confidential.

AARs are used by election offices to study and improve the effectiveness of their operations or security program following an election, specific incidents, and other periods of elevated threat.

Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vulnerabilities.

Disinformation campaigns are engineered for influence, typically seeking to exploit the psychology of victims’ emotions, identities, political affinities, and existing societal rifts.

DNS resolution is an avenue for malicious actors to conduct attacks against end users. These attacks can result in compromised data or the introduction of malware to a system.

Cloud storage also presents challenges to organizations that need to ensure the confidentiality, integrity, and availability of their data

Indicator sharing programs allow election offices to maintain visibility into ongoing cyber threats and quickly integrate them into defensive tools.

The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are connected to the internet.

1 2 3 4