CIS Logo
tagline: Confidence in the Connected World


In advance of the 2018 US elections, the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC®) created a new resource to



The 2017 Nationwide Cybersecurity Review (NCSR) encapsulates the findings of an extensive national survey that measures gaps and capabilities of SLTTs.


The Fall 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights National Cyber Security Awareness Month and more.


Malicious actors leverage public interest during natural disasters and other high profile events in order to conduct financial fraud and disseminate



CIS Controls V7 Poster
September 10, 2018
Learn about the basic, foundational, and organizational breakdown of the CIS ControlsV7 along with 5 keys for building a cybersecurity program.


This guide is intended as a desk reference for state, local, tribal, and territorial (SLTT) governments in order to provide a basic introduction to



Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to



These winners of the National Cyber Awareness Poster Contest share important cybersecurity tips anywhere you hang



This calendar’s artwork was developed by grade K-12 students who participated in the 2017/2018 MS-ISAC National Cybersecurity Poster Contest.


Overview Spear phishing occurs when cyber threat actors send a targeted electronic communication to an individual or a small group of users, while



A Practice Note providing an overview of what cyber vulnerability management programs are, how they work, and the key role they play in any



This past year has been a year of unprecedented growth for CIS Our role as a global, independent leader in cybersecurity for public and



The Summer 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights the continued evolution of the CIS Controls and more.


The CIS Controls ICS Companion Guide will allow the readier to tailor the CIS Controls in the context of a specific IT/OT enterprise.


Overview Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid This is achieved when the ransomware



1 2 3 4 5 7