×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The CIS Controls Version 6.0 was translated into Lithuanian and the poster provided by the SANS Council on Cyber Security.


The Privacy Implications Guide is a partner to the CIS Controls V.6, which are a set of prioritized best practices designed to protect information systems.


A privacy impact assessment is an effective posture of enterprise cybersecurity need not and, indeed, should not compromise individual privacy.


Week 4 of National Cyber Security Awareness Month focuses on our continuously connected lives in a rapidly developing digital world.


October 10, 2016 Arlington, VA The Center for Internet Security (CIS) partnered with California Attorney General Kamala Harris’ staff to



Implementation of the CIS Controls will require many organizations to shift their mindset on security and how they approach IT operations and defense.


CIS Controls 2016 Poster
September 10, 2016
The CIS Controls are a set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.


Gain insight on the CIS Controls and learn how they have matured into an international movement of individuals and institutions.


IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.


August 18, 2016 East Greenbush, NY The European Telecommunications Standards Institute (ETSI), which produces globally applicable standards for



Check out this infographic to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.


Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.


July 6, 2016 East Greenbush National Consortium for Advanced Policing Cybersecurity Guide The Center for Internet Security’s (CIS) Multi-State



The malevolent person or group behind a security breach has your username, possibly email address and password and probably additional personal information.


May 10, 2016 ARLINGTON, Va The CIS Critical Security Controls™ for Effective Cyber Defense (CIS Controls) ranked as a leading framework in



1 21 22 23 24