x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



By definition, cyber resilience measures an organisation’s strength in preparing for, operating through and recovering from an attack.


The Utah safe harbor is not expressly limited to tort claims, potentially broadening its scope to include an affirmative defense against contract claims.


Cybersecurity for Pharmaceutical Companies offers advice about how to protect the pharmaceutical industry from an Operational Technology (OT) perspective.


The Center for Internet Security recently launched a free tool for private U.S. hospitals to block malicious activity such as ransomware.


Zero trust architectures reinforce the point that no layer of the stack trusts the underlying components, whether that be hardware or software.


When it comes to job growth, the protection of the country, the education of our next generation of people, these are very, philanthropic types of things.


Tony Sager feels the CIS Controls reflect a reality in which most organizations are faced with the same kinds of digital threats.


This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, providing a safe harbor from certain claims.


The California IoT Law does not define the term “reasonable” as it relates to device security; it does provide some guidelines though.


Basic cyber hygiene or a lack thereof, can mean the difference between a thwarted or successful cyber-attack against your organization.


The rise in security incidents has been triggered in part by the inability of many organizations to automate cloud security.


Connecticut might soon follow Ohio and Utah by enacting a law that offers liability protection against ransomware and other cyberattacks.


The Missouri House bill also requires local election authorities to be members of the Center for Internet Security's EI-ISAC.


The frameworks laid out in the bill are well recognized in the cybersecurity community, including NIST, CIS, ISO, and IEC.


The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense.


1 2 3 4 5 27