Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

In this podcast, learn why vendors and consultants should offer software with built-in cybersecurity as a safer alternative to updating vulnerabilities with patches.

The Authority to Operate (ATO) program on AWS helps organizations meet common cloud security frameworks. The CIS Benchmarks help.

Cybersecurity compliance with multiple policy, regulatory, and legal security frameworks and standards is challenging but associated best practices can be used as a starting point in building your plan.

The Role of Service Providers in Transforming Security, describes the current threat landscape and current trends to support built-in security.

Here are is the why, when, who, what, and where for creating a cybersecurity plan, the first step in starting secure and staying secure.

The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.

Whether it is an employee wanting to expand their career or an employer seeking a new hire, soft skills are just as important as technical knowledge.

Join the CIS at booth 209 at AWS Public Sector Summit in Washington, D. C., on September 27-29 at the Walter E. Washington Convention Center.

CIS Controls Internet of Things (IoT) and Mobile Companion Guides for CIS Critical Security Controls v8 was released to support the demand from evolving technology (modern systems and software), threats, and even the changes in the workplace.

Start your cloud migration with CIS Hardened Images. Then your organization can have peace of mind in pre-hardened virtual machine images.

This podcast episode lists the top 5 cybersecurity tips for the family including creating passwords, looking out for malware and more.

The Top 10 Malware variants comprise 63% of the total malware activity in July 2021. Shlayer is likely to continue its prevalence in the Top 10 Malware for the coming quarter.

Email hoaxes attempt to frighten recipients into paying an extortion demand, but can't actually carry out their threats. Here's how to recognize an email hoax.

Podcast hosts Tony Sager and Sean Atkinson talk about what they like and dislike about the cybersecurity industry.

CIS offers CIS Hardened Images layered with secure Docker containers, including Amazon Linux, Ubuntu Linux, PostgreSQL, and NGINX.

1 2 3 4 24