CIS Logo
tagline: Confidence in the Connected World

CIS Hardened Images are configured to meet the industry-accepted best practices that are collaboratively developed by aconsensus community. 

The August 2018 webinar will highlight reasons why organizations require an application security program.

This webinar will discuss the CIS Controls Version 7 and the unique constraints and opportunities in Industrial Control Systems (ICS) environments.

Discover the history of cryptocurrencies, how they operate and what differentiates them from traditional currencies, the concepts behind the technology.

Discover how to conduct cyber risk assessments so they meet the requirements of established information security risk assessment standards.

Learn more about the GDPR and how CIS can help organizations become compliant and more secure.

Attendees will gain insight into why all SLTT entities should be concerned about compliance with the General Data Protection Regulation.

The CIS Controls are a prioritized set of actions any organization can follow to improve their cybersecurity posture.

This webinar explores ways to manage the complexity of cybersecurity, drawing on best practices and the presenter's personal experiences in cybersecurity.

Live at the Symantec Government Symposium focusing on Smart Cities, Cybersecurity, and The Intersection of IoT.

The October 2017 MS-ISAC National Webinar will take a deep dive into National Cyber Security Awareness Month (NCSAM).

The focus of this webinar is to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with the CIS Controls.

The mobile device in your pocket has transformed, quite literally, every facet of your life. Learn about the threats and what to do to stay secure.

CIS is hosting a cybersecurity webinar focused on how German organizations can use existing free or low-cost tools to greatly improve their cyber defenses.

Where Privacy Meets Security
Thursday June 29, 2017

CIS and New America, a Washington, DC based think tank hosted a webinar on June 28, 2017, where cybersecurity experts discussed how organizations can

1 2 3 4