×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

Secure Your Organization


Secure Specific Platforms


U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

Secure Your Organization


Learn


Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



In honor of International Women's Day, CIS asked female team members at every level to share career advice for other women in tech.


Colorado’s PAM strategy is one aspect of a cybersecurity program that follows “good hygiene." Tracking and evaluating hygiene leads to benchmarking.


March 24, 2021 | 4:00 pm EDT What attendees will be learning: In Part 2 of this four-part series, we'll discuss how to align with and achieve CMMC



New features available in the CIS CSAT Pro v.1.4.0. include mappings to the NIST CSF, ability to edit assessment details, and more.


Zero trust has evolved from preventing attacker lateral movement, to a pervasive concept that spans infrastructure, device firmware, software, and data.


The guide identifies the most common attack types on supply chains and provides an analysis of each election infrastructure component.


Cybersecurity expectations are vague, and that has to change if there is any chance of approaching a reasonable amount of cybersecurity.


You finally got your vaccine, and you’re excited to share the proof. Here’s why that may not be a good idea, and what you can do instead.


With talk of cyber Pearl Harbors or digital 9/11s, critical infrastructure cybersecurity might border on alarmism, but there is real reason for concern.


Smart devices need smart security. Read this blog post to learn how you can keep IoT devices secure.


CIS's differentiator is trust in our controls and benchmarks that provide assurance that systems and applications are as expected.


Identfying the five trends of internet security, discussing evidence of change, examples of architectural patterns that scale, and a possible future state.


For public LANs, a poisoned DNS cache could allow an attacker to potentially poison up to 10 different domains simultaneously.


Tony Sager highlights some of the accomplishments CIS has made over the past 20 years for creating confidence in the connected world.


Data encryption, network hardening, and automated threat hunting provide a basis for defense in depth for healthcare organizations and telehealth in 2021.


1 2 3 4 5 23