Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Cloud Security CIS Cloud Security Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite®
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


Secure Your Organization


filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Election offices can benefit from security assessments to prevent cyberattacks, meet national standards, and gain voter trust.

Election offices with resource constraints can especially benefit from using the MSP model. The cost and scalability of MSPs allow offices with a limited IT staff to access services that may be challenging to implement with a small IT team.

In some cases, no one person or organization has control over open source code and therefore the user would not have any assurances of the reliability and security of the code.

Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endpoints.”

Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote network on an untrusted connection. This ensures that all transmitted data remains confidential.

AARs are used by election offices to study and improve the effectiveness of their operations or security program following an election, specific incidents, and other periods of elevated threat.

Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vulnerabilities.

Disinformation campaigns are engineered for influence, typically seeking to exploit the psychology of victims’ emotions, identities, political affinities, and existing societal rifts.

DNS resolution is an avenue for malicious actors to conduct attacks against end users. These attacks can result in compromised data or the introduction of malware to a system.

Cloud storage also presents challenges to organizations that need to ensure the confidentiality, integrity, and availability of their data

Indicator sharing programs allow election offices to maintain visibility into ongoing cyber threats and quickly integrate them into defensive tools.

The Internet of Things (IoT) is a term used to describe physical devices (other than computers, phones, and servers) that are connected to the internet.

Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats.

Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money

What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content

1 2 3 4