CIS Logo
tagline: Confidence in the Connected World

Download this free guide help make your videoconferencing platoforms like Zoom, WebEx, or GoToWebinar, secure and support basic cyber hygiene.

This document sets forth an actionable approach to ensure each state has cyber governance, and can maximize investments while securing their state.

Learn how to secure against Emotet Malware in a joint paper written by the Cybersecurity and Infrastructure Security Agency & the MS-ISAC.

Cybersecurity Quarterly Fall 2020 focuses on the important advances in cyber defense, along with new tools to track implementation of CIS Controls, and more.

LokiBot Malware
September 22, 2020
LokiBot uses a credential & information stealing malware that has been used for a broad range of cyber actors across a variety of data compromise use cases.

This document maps the CIS Controls to the Payment Card Industry Data Security Standard (PCI DSS).

2019 provided CIS with remarkable growth in our products and services, furthering our mission as an independent, global leader in cybersecurity.

The CIS Community Defense Model (CDM) brings more rigor, analytics, and transparency to the security recommendations found in the CIS Controls. T

The CIS Password Policy Guide was developed by the CIS Benchmarks community and consolidates password guidance in one place.

Download the CIS SecureSuite Membership eBook to learn how the integrated cybersecurity tools and resources can help secure organizations of every size.

Download the CIS Hardened Images eBook and learn more about the securely pre-configured virtual machine images.

Learn how CIS makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.

The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, and more.

CIS Benchmarks and CIS Hardened Images take the guesswork out of fulfilling your portion of the Cloud Shared Responsibility Model.

The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.

1 2 3 10