Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996

This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.

Podcast hosts Tony Sager and Sean Atkinson talk about what they like and dislike about the cybersecurity industry.

Companies that have greater confidence in security metrics are aggregating data from numerous sources to ensure a clean, correlated, and bias-free dataset.

This podcast episode host Tony Sager and guest Brian de Vallance explain that technology is not wizardry and about government and technical experts working together to create universal cybersecurity policy.

Begin to implement a Zero Trust strategy using the CIS Controls v8 to improve the security of IT environments as demonstrated over time by reduced attacker dwell time.

With the introduction of IGs in v7.1 and the changes in v8, the CIS Controls offer the best/easiest path to good cyber hygiene for smaller organizations.

Zero trust is an important information security architectural shift and attestation can provide system-level remediation and resiliency.

The law takes effect on Oct. 1 and makes Connecticut the third state after Ohio and Utah to provide such incentives for implementing cyber frameworks.

Bill includes the use of the CIS Critical Security Controls as part of a reasonable cybersecurity program HARTFORD, Conn, July 12, 2021 –

Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center for Internet Security.

Businesses that follow one of the approved frameworks will have an “affirmative defense” against claims that a breach was the result of a “failure to implement reasonable cybersecurity controls.”

Recent Day One attacks have demonstrated how difficult it can be for organizations to react when vulnerabilities are announced.

Hosts Todd Fitzgerald and Tony Sager discuss CIS Controls v8, as well as ways of mitigating ransomware and other SMB cybersecurity threats.

Employees returning to the office will need cybersecurity awareness training. The SANS Summer Buy Window offers awareness training to SLTTs at a discount.

1 2 3 4 24