CIS Logo
tagline: Confidence in the Connected World


The Privacy Implications Guide is a companion to the CIS Controls V6, which are a set of prioritized best practices designed to protect information



An effective posture of enterprise cybersecurity need not and, indeed, should not compromise individual privacy Many laws, regulations, guidelines,



When some organizations are introduced to the CIS Controls, they may become discouraged thinking that the Controls reflect too high a bar and are



Every October during National Cyber Security Awareness Month (NCSAM), the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to



Record of the proclamation for State Governors to make in support of National Cyber Security Awareness



CIS Controls 2016 Poster
September 10, 2016
The CIS Controls are a set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.


Gain insight on the CIS Controls and learn how they have matured into an international movement of individuals and



IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.


Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.


Help your organization stay secure in a mobile world with the CIS Controls Mobile Companion Guide (Version 6).


CIS 2015 Annual Report
January 20, 2016

Since its creation in 2000, CIS has established itself as a valued and trusted resource for both the public and private sectors, and has grown its



Introduction On June 8, 2015, the White House’s Office of Management and Budget released a new policy requiring all publicly accessible Federal



Counties should take every precaution in efforts to prevent and mitigate the effects of cyber attacks Download this PDF to see our county-focused



1 5 6 7