CIS Logo
tagline: Confidence in the Connected World

The Privacy Implications Guide is a companion to the CIS Controls V6, which are a set of prioritized best practices designed to protect information

An effective posture of enterprise cybersecurity need not and, indeed, should not compromise individual privacy Many laws, regulations, guidelines,

When some organizations are introduced to the CIS Controls, they may become discouraged thinking that the Controls reflect too high a bar and are

Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to

Record of the proclamation for State Governors to make in support of National Cyber Security Awareness

CIS Controls 2016 Poster
September 10, 2016
The CIS Controls are a set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.

Gain insight on the CIS Controls and learn how they have matured into an international movement of individuals and

IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.

Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.

Help your organization stay secure in a mobile world with the CIS Controls Mobile Companion Guide (Version 6).

CIS 2015 Annual Report
January 20, 2016

Since its creation in 2000, CIS has established itself as a valued and trusted resource for both the public and private sectors, and has grown its

Introduction On June 8, 2015, the White House’s Office of Management and Budget released a new policy requiring all publicly accessible Federal

Counties should take every precaution in efforts to prevent and mitigate the effects of cyber attacks Download this PDF to see our county-focused

1 5 6 7