Download the CIS Hardened Images eBook and learn more about the securely pre-configured virtual machine images.

Learn how CIS makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.

The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, and more.

CIS Benchmarks and CIS Hardened Images take the guesswork out of fulfilling your portion of the Cloud Shared Responsibility Model.

The CIS Controls and Sub-Controls are mapped to each CMMC level as a tool for organizations to help with meeting the CMMC requirements.

This calendar’s artwork was developed by grade K-12 students who participated in the 2019/2020 MS-ISAC National Cybersecurity Poster Contest.

CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.

Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.

This COVID-19 cybersecurity resource guide from CIS provides information about common cyber-attacks that are currently being reported.

The CIS Controls Implementation Groups provide a simple and accessible way to help organizations of different classes focus their security resources.

The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 election.

Learn how macro instructions used for automation can be leveraged by cybercriminals – and what to do about it.

Learn what server message block (SMB) is, how it can be leveraged by cybercriminals, and what to do to deal with this issue.

The Center for Internet Security (CIS) is providing recommendations for state and local election offices to invest these funds in cybersecurity initiatives.

CIS offers this white paper to help organizations understand the RABET-V process and develop mature, risk-informed software development practices.

1 2 3 4 10