CIS will discuss the importance of SaaS security and security guidelines like the CIS Benchmarks,Qualys will introduce SaaS Detection and Response (SaaSDR).


March 24, 2021 | 4:00 pm EDT What attendees will be learning: In Part 2 of this four-part series, we'll discuss how to align with and achieve CMMC



On-demand webinar: Leverage Center for Internet Security (CIS) resources for guidance for your public cloud account, as-a-service environments, and virtual machine images.


CIS Benchmarks Demo
March 2, 2021
Join our monthly demo and learn how the secure configuration guidelines of the CIS Benchmarks can help keep your organization safe & secure.


A discussion of the big three open source Content Management Systems:, WordPress, Drupal, Joomla, and the LAMP and WIMP stacks that they leverage.


The December 2020 ISAC National Webinar discussed why open source anonymizing tools exist and how to use them. The recording is now available to view.


Wednesday, October 28 | 2:00 PM EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask,



Join DBIR Co-Author Philippe Langlois, as he highlights the key findings of the 2020 DBIR and examines the critical insights that inform this year’s report.


The "How Nevada Can Spotlight its Leadership in Data Security" webinar will include panel discussions by government and a private sector industry leaders.


Attendees will learn about resources to help consumers and SMBs report, recover, and reinforce their security after being impacted by cybercrime.


This virtual training series, exclusively for our small business and SLTT members, provides step-by-step guidance to get the most out of CIS SecureSuite.


Join our webinar to learn how CIS SecureSuite Services and Consulting Members increase return on investment for their clients.


This webinar provides guidance for securing home networks and small office equipment. From purchasing a device to encrypting traffic and more.


Chief Information Officers have a unique set of responsibilities in a pandemic that far exceed the normal requirements of maintaining IT operations.


The Ransomware Prevention - Red Team vs Blue Team webinar will highlight the evolution of ransomware, common tactics used, and defensie strategies.


1 2 3 5