CIS Logo
tagline: Confidence in the Connected World


The CIS Controls Version 6.0 was translated into Lithuanian and the poster provided by the SANS Council on Cyber Security.


The Privacy Implications Guide is a partner to the CIS Controls V.6, which are a set of prioritized best practices designed to protect information systems.


A privacy impact assessment is an effective posture of enterprise cybersecurity need not and, indeed, should not compromise individual privacy.


Implementation of the CIS Controls will require many organizations to shift their mindset on security and how they approach IT operations and defense.


During NSCAM the MS-ISAC conducts a national K-12 "Kids Safe Online" poster contest to encourage young people to use the Internet safely and securely.


Here is a record of the proclamation for the State Governors to make in support of National Cyber Security Awareness Month.


CIS Controls 2016 Poster
September 10, 2016
The CIS Controls are a set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.


Gain insight on the CIS Controls and learn how they have matured into an international movement of individuals and institutions.


IoT is a natural evolution of the Internet as we know it today, to include ubiquitous smart-end devices providing a variety of services and functions.


Use these sample metrics as a starting point to identify key information to help track progress of implementing the CIS Controls.


Help your organization stay secure in a mobile world with the CIS Controls Mobile Companion Guide (Version 6).


CIS 2015 Annual Report
January 20, 2016
Since its creation in 2000, CIS has established itself as a valued and trusted cybersecurity authority and resource for both the public and private sectors.


The White House’s Office of Management and Budget released a new policy requiring all publicly accessible Federal websites & web services to use the HTTPS.


Counties should take every precaution in efforts to prevent and mitigate the effects of cyber attacks. See our county-focused cybersecurity recommendations.


1 6 7 8