CIS Logo
tagline: Confidence in the Connected World


The Winter 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights 2019 cybersecurity predictions from experts and more.


Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments.


The MS-ISAC recommends that organizations establish a standard for the creation of strong passwords


Cybersecurity is on the minds of most IT professionals these days. Read our CISO's new eBook to learn how to bolster your cyberseucrity poster.


Tabletop exercises are used to help cybersecurity teams develop tactical strategies for securing their systems. Review six scenarios to prepare your team.


The 2017 Nationwide Cybersecurity Review (NCSR) encapsulates the findings of an extensive national survey that measures gaps and capabilities of SLTTs.


The Fall 2018 issue of Cybersecurity Quarterly, the official digital publication from CIS highlights National Cyber Security Awareness Month and more.


Malicious actors leverage public interest during natural disasters and other high profile events in order to conduct financial fraud and spread malware.


CIS Controls V7 Poster
September 10, 2018
Learn about the basic, foundational, and organizational breakdown of the CIS ControlsV7 along with 5 keys for building a cybersecurity program.


This guide is a reference for state, local, tribal, and territorial (SLTT) governments to provide a basic introduction to recent cyber crime activities.


Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest.


CIS wants to show the importance of the National Cybersecurity Awareness Month (NCSAM) with the winners of our NCSAM poster contest.


This calendar’s artwork was developed by grade K-12 students who participated in the 2017/2018 MS-ISAC National Cybersecurity Poster Contest.


Spear Phishing is a targeted attack towards a small group of users that looks like legitimate entities. CIS provides a guide to spotting these threats.


A Practice Note providing an overview of what cyber vulnerability management programs are, how they work, and the key role they play in any organization.


1 2 3 4 5 6 9