CIS Logo
tagline: Confidence in the Connected World


This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.


This document contains examples of methods for tracking hardware, software, and sensitive information in an



The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide offers practical guidance on cyber hygiene for Windows 10 users


Cybersecurity Quarterly Summer 2019 highlights the new way to look at the CIS Controls®, malware that on the rise, and how Albert IDS can protect networks.


This guide provides cyber defense resources for organizations in the financial sector to keep PII secure and meet regulatory/industry compliance standards.


Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your process of securing IoT devices.


The CIS Controls Internet of Things Companion Guide provides best practices and guidance for implementing the CIS Controls to IoT devices.


2018 Year in Review
June 10, 2019

The 2018 Year in Review covers CIS' advances in cybersecurity via the EI-ISAC®, MS-ISAC®, CIS Benchmarks™, CIS SecureSuite®, CIS Hardened



This white paper highlights the importance of why organizations need to protect their server workloads and containers and how CIS Hardened Images can help.


This security primer provides information on general DNS operations, IDS event types, requirements for investigation, recommendations, and references.


This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls Version 7.1.


This spreadsheet is a reference document to quickly see the specific changes from Version 7 to Version 7.1 of the CIS Controls.


Discover the Sub-Controls in Implementation Groups that help organizations of different classes focus their security resources.


LockerGoga is a ransomware that creates disruptive effects on industrial and manufacturing firms' networks, resulting in costly production downtime


The Spring 2019 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights the malware traits that dominated in 2018 and more.


1 2 3 7