CIS Logo
tagline: Confidence in the Connected World


The CIS Community Defense Model (CDM) brings more rigor, analytics, and transparency to the security recommendations found in the CIS Controls. T


The CIS Password Policy Guide was developed by the CIS Benchmarks community and consolidates password guidance in one place.


Download the CIS SecureSuite Membership eBook to learn how the integrated cybersecurity tools and resources can help secure organizations of every size.


Download the CIS Hardened Images eBook and learn more about the securely pre-configured virtual machine images.


CIS Overview eBook
July 20, 2020
Learn how CIS makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.


The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, and more.


CIS Benchmarks and CIS Hardened Images take the guesswork out of fulfilling your portion of the Cloud Shared Responsibility Model.


The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.


This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.


CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.


Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.


This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.


The CIS Controls Implementation Groups provide a simple and accessible way to help organizations of different classes focus their security resources.


The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 election.


Learn how macro instructions used for automation can be leveraged by cybercriminals – and what to do about it.


1 2 3 9