×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



Week 4 of National Cyber Security Awareness Month focuses on our continuously connected lives in a rapidly developing digital world.


Cybercriminals routinely leverage vulnerabilities and misconfigurations in software, servers, printers, and devices to gain access to systems.


Configuration management ensures that the software and devices running on the network are current, trusted and secure.


Inventory management can be challenging for any organization, but you can’t protect your systems unless you know what’s running on them.


October 10, 2016 Arlington, VA The Center for Internet Security (CIS) partnered with California Attorney General Kamala Harris’ staff to



Implementation of the CIS Controls will require many organizations to shift their mindset on security and how they approach IT operations and defense.


Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access.


CIS Controls 2016 Poster
September 10, 2016
The CIS Controls are a set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.


Gain insight on the CIS Controls and learn how they have matured into an international movement of individuals and institutions.


IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.


August 18, 2016 East Greenbush, NY The European Telecommunications Standards Institute (ETSI), which produces globally applicable standards for



Check out this infographic to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.


Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.


July 6, 2016 East Greenbush National Consortium for Advanced Policing Cybersecurity Guide The Center for Internet Security’s (CIS) Multi-State



The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.


1 20 21 22 23