White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
251 Results Found
1 - 10 of 251 results
Published on 10.31.2024
2024 Election Threat LandscapeElection offices must improve their preparedness for the 2024 election threat landscape. Download our joint white paper for recommendations.
Published on 10.25.2024
Reasonable Cybersecurity GuideIn the United States, there is no specification of what an organization must do to meet reasonable cybersecurity. This guide seeks to do just tha...
Published on 10.18.2024
Combatting RansomwareCyber threat actors leverage multiple attack vectors to distribute ransomware. Download our guide to learn about mitigation strategies you can im...
Published on 10.07.2024
Cybersecurity Quarterly Fall 2024The Fall 2024 issue of Cybersecurity Quarterly centers around the notion of "Adapting for the Future." Check out our articles today!
Published on 09.27.2024
Nationwide Cybersecurity Review: 2023 Summary ReportThe Nationwide Cybersecurity Review 2023 Summary Report dives into the cyber maturity of U.S. SLTTs across the nation. Download your copy today!
Published on 09.20.2024
Establishing Essential Cyber Hygiene Version 8.1Many successful cyber attacks exploit "poor hygiene." Download this guide to drive your implementation of essential cyber hygiene using the CIS C...
Published on 09.19.2024
Guide to Asset Classes: CIS Critical Security Controls v8.1You need to verify you've accounted for and secured in-scope asset classes on an ongoing basis. Download our guide to learn how CIS Controls v8.1...
Published on 09.18.2024
DMARC Guide: Microsoft 365 and Google WorkspaceSetting up DMARC is not a trivial task. Download our guide to learn how to set DMARC up for Microsoft 365 and Google Workplace email.
Published on 09.16.2024
2024 MS-ISAC Tribal Sector Cybersecurity ReportThe 2024 MS-ISAC® Tribal Sector Cybersecurity Report provides a comprehensive overview of the cybersecurity landscape for U.S. Tribal or...
Published on 08.29.2024
The CIS Security Operations Center (SOC): The Key to Growing Your SLTT's Cyber MaturitySLTTs can't address their top cybersecurity concerns on their own. They need access to experts who can help. This is where a SOC can help.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More