Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


Secure Your Organization

Secure Specific Platforms

U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


Secure Your Organization


Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

In honor of International Women's Day, CIS asked female team members at every level to share career advice for other women in tech.

Colorado’s PAM strategy is one aspect of a cybersecurity program that follows “good hygiene." Tracking and evaluating hygiene leads to benchmarking.

March 24, 2021 | 4:00 pm EDT What attendees will be learning: In Part 2 of this four-part series, we'll discuss how to align with and achieve CMMC

New features available in the CIS CSAT Pro v.1.4.0. include mappings to the NIST CSF, ability to edit assessment details, and more.

Zero trust has evolved from preventing attacker lateral movement, to a pervasive concept that spans infrastructure, device firmware, software, and data.

The guide identifies the most common attack types on supply chains and provides an analysis of each election infrastructure component.

Cybersecurity expectations are vague, and that has to change if there is any chance of approaching a reasonable amount of cybersecurity.

You finally got your vaccine, and you’re excited to share the proof. Here’s why that may not be a good idea, and what you can do instead.

With talk of cyber Pearl Harbors or digital 9/11s, critical infrastructure cybersecurity might border on alarmism, but there is real reason for concern.

Smart devices need smart security. Read this blog post to learn how you can keep IoT devices secure.

CIS's differentiator is trust in our controls and benchmarks that provide assurance that systems and applications are as expected.

Identfying the five trends of internet security, discussing evidence of change, examples of architectural patterns that scale, and a possible future state.

For public LANs, a poisoned DNS cache could allow an attacker to potentially poison up to 10 different domains simultaneously.

Tony Sager highlights some of the accomplishments CIS has made over the past 20 years for creating confidence in the connected world.

Data encryption, network hardening, and automated threat hunting provide a basis for defense in depth for healthcare organizations and telehealth in 2021.

1 2 3 4 5 23