×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



CIS is hosting a cybersecurity webinar focused on how German organizations can use existing free or low-cost tools to greatly improve their cyber defenses.


Where Privacy Meets Security
Thursday June 29, 2017

CIS and New America, a Washington, DC based think tank hosted a webinar on June 28, 2017, where cybersecurity experts discussed how organizations can



The June MS-ISAC National Webinar on Thursday, June 18th, 2017 will be discussing the working cloud and how to tackle security risks.


Embracing the public cloud, mobile, and DevOps leads to an expanding attack surface that challenges our approaches to managing threats and vulnerabilities.


Gain some insight on cybersecurity while traveling abroad often,


This webinar reviewed the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.


Join Michael Kaiser, Executive Director of the National Cyber Security Alliance, for a deeper dive into NCSAM.


Learn how levels of government can get smarter on how they respond to cyber threats.


Prioritize Your NIST CSF Implementation with the CIS Controls - Lessons Learned from the City of Portland


Learn about the underlying assumptions IoT devices make, common methods they utilize to communicate, and what type of information is at risk.


1 3 4 5