Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

CIS is hosting a cybersecurity webinar focused on how German organizations can use existing free or low-cost tools to greatly improve their cyber defenses.

Where Privacy Meets Security
Thursday June 29, 2017

CIS and New America, a Washington, DC based think tank hosted a webinar on June 28, 2017, where cybersecurity experts discussed how organizations can

The June MS-ISAC National Webinar on Thursday, June 18th, 2017 will be discussing the working cloud and how to tackle security risks.

Embracing the public cloud, mobile, and DevOps leads to an expanding attack surface that challenges our approaches to managing threats and vulnerabilities.

Gain some insight on cybersecurity while traveling abroad often,

This webinar reviewed the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.

Join Michael Kaiser, Executive Director of the National Cyber Security Alliance, for a deeper dive into NCSAM.

Learn how levels of government can get smarter on how they respond to cyber threats.

Prioritize Your NIST CSF Implementation with the CIS Controls - Lessons Learned from the City of Portland

Learn about the underlying assumptions IoT devices make, common methods they utilize to communicate, and what type of information is at risk.

1 3 4 5