CIS Logo
tagline: Confidence in the Connected World


This calendar’s artwork was developed by grade K-12 students who participated in the 2017/2018 MS-ISAC National Cybersecurity Poster Contest.


Spear Phishing is a targeted attack towards a small group of users that looks like legitimate entities. CIS provides a guide to spotting these threats.


A Practice Note providing an overview of what cyber vulnerability management programs are, how they work, and the key role they play in any organization.


Learn about how CIS continued to experience growth and expand recognition as a global leader in cybersecurity throughout 2017.


The Summer 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights the continued evolution of the CIS Controls and more.


The CIS Controls ICS Companion Guide will allow the readier to tailor the CIS Controls in the context of a specific IT/OT enterprise.


CIS with MS-ISAC presents a checklist to help your organization deal with a cyber incident and how to be prepared in the future.


Having credentials exposed can have far reaching affects, such as data breaches, system compromises, loss of brand reputation, as well as financial losses.


CIS RAM is an information security risk assessment method that helps organizations implement and assess their security posture against the CIS Controls™.


The Spring 2018 issue of Cybersecurity Quarterly highlights ways to work together to train the next generation of cybersecurity and more.


CIS Controls are updated & reviewed in collaboration with international cybersecurity experts and IT professionals in various industries.


CIS Controls are updated & reviewed in collaboration with international cybersecurity experts and IT professionals in various industries.


An email bomb is an attack against an email server designed to inhibit the server’s normal function or render it unresponsive or causing network downtime.


Learn more about Typosquatting in this MS-ISAC Security Primer & what to do if you are ever targeted by one of these scams or make a typographical mistake.


Olympic related content viewed on work computers may be used to disseminate malware and conduct cyber scams and fraud throughout your organizations systems.


1 2 3 4 5 6 8