Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

This document provides a detailed mapping of the relationships between CIS Controls v8 and NIST SP 800-53 R4.

The CIS Controls v8 change log spreadsheet provides an overview of the changes from CIS Controls version 7.1 to version 8.

This mapping document demonstrates connections between NIST Cybersecurity Framework (CSF) and the CIS Controls version 8.

This CIS Controls v8 Mobile Companion Guide offers a consistent approach for analyzing CIS Controls in the context for mobile.

CIS was uniquely positioned to handle both cybersecurity and misinformation reports to protect the 2020 election infrastructure.

The Spring 2021 issue focuses on overall security using the CIS Controls, strengthening the healthcare industry's cyber defenses, and protecting against threats when outsourcing IT services.

The ongoing growth in the use of cloud computing brings challenges to ensure security and the protection of data in a cloud environment.

The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of CIS, working together to fight cybercrime, and much more.

This paper provides an overview of the CIS Controls® and provides a questionnaire to ensure basic cyber hygiene needs are met by MSPs.

This guide provides an overview of remote desktop protocol (RDP), common attacks associated with it, and how to best protect against an RDP-based attack.

Download this free guide help make your videoconferencing platoforms like Zoom, WebEx, or GoToWebinar, secure and support basic cyber hygiene.

This document sets forth an actionable approach to ensure each state has cyber governance, and can maximize investments while securing their state.

Learn how to secure against Emotet Malware in a joint paper written by the Cybersecurity and Infrastructure Security Agency & the MS-ISAC.

Cybersecurity Quarterly Fall 2020 focuses on the important advances in cyber defense, along with new tools to track implementation of CIS Controls, and more.

LokiBot Malware
September 22, 2020
LokiBot uses a credential & information stealing malware that has been used for a broad range of cyber actors across a variety of data compromise use cases.

1 2 3 4 11