×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The ongoing growth in the use of cloud computing brings challenges to ensure security and the protection of data in a cloud environment.


The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of CIS, working together to fight cybercrime, and much more.


This paper provides an overview of the CIS Controls® and provides a questionnaire to ensure basic cyber hygiene needs are met by MSPs.


This guide provides an overview of remote desktop protocol (RDP), common attacks associated with it, and how to best protect against an RDP-based attack.


Download this free guide help make your videoconferencing platoforms like Zoom, WebEx, or GoToWebinar, secure and support basic cyber hygiene.


This document sets forth an actionable approach to ensure each state has cyber governance, and can maximize investments while securing their state.


Learn how to secure against Emotet Malware in a joint paper written by the Cybersecurity and Infrastructure Security Agency & the MS-ISAC.


Cybersecurity Quarterly Fall 2020 focuses on the important advances in cyber defense, along with new tools to track implementation of CIS Controls, and more.


LokiBot Malware
September 22, 2020
LokiBot uses a credential & information stealing malware that has been used for a broad range of cyber actors across a variety of data compromise use cases.


This document maps the CIS Controls to the Payment Card Industry Data Security Standard (PCI DSS).


2019 provided CIS with remarkable growth in our products and services, furthering our mission as an independent, global leader in cybersecurity.


The CIS Community Defense Model (CDM) brings more rigor, analytics, and transparency to the security recommendations found in the CIS Controls. T


The CIS Password Policy Guide was developed by the CIS Benchmarks community and consolidates password guidance in one place.


Download the CIS SecureSuite Membership eBook to learn how the integrated cybersecurity tools and resources can help secure organizations of every size.


Download the CIS Hardened Images eBook and learn more about the securely pre-configured virtual machine images.


1 2 3 4 11