Filter by Topic

73 Results Found
41 - 50 of 73 results
CMMC WEBINAR SERIES PART 2: Align and Achieve CMMC Compliance Utilizing CIS Best Practices
Published on 02.19.2021
CMMC WEBINAR SERIES PART 2: Align and Achieve CMMC Compliance Utilizing CIS Best Practices
March 24, 2021 | 4:00 pm EDT What attendees will be learning: In Part 2 of this four-part series, we’ll discuss how to align with and achieve CMM...

On-Demand Webinar: How to Secure Your Cloud with CIS
Published on 02.05.2021
On-Demand Webinar: How to Secure Your Cloud with CIS
Learn how to leverage Center for Internet Security (CIS) resources to secure your cloud infrastructure. CIS cloud security resources include guid...

Open Source Content Management Systems
Published on 01.19.2021
Open Source Content Management Systems
Previously presented on February 11, 2021 | 3:00 pm EST What Attendees Learned: A discussion of the big three open source Content Management Syst...

Understanding Open Source Anonymizing Tools
Published on 11.13.2020
Understanding Open Source Anonymizing Tools
Previously presented on: December 3, 2020 | 3:00 pm ET During this webinar, attendees were introduced to some of the concepts regarding three maj...

Reduce Security Breaches with 6 Basic & Simple Steps
Published on 10.22.2020
Reduce Security Breaches with 6 Basic & Simple Steps
Wednesday, October 28 | 2:00 P.M. EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask, “Wh...

The 2020 Verizon Data Breach Investigations Report (DBIR)
Published on 07.22.2020
The 2020 Verizon Data Breach Investigations Report (DBIR)
Thursday, August 6th | 2:00 pm It’s that time of the year again as we’re presented with another Verizon Data Breach Investigations Report. This a...

How Nevada Can Spotlight its Leadership in Data Security
Published on 07.17.2020
How Nevada Can Spotlight its Leadership in Data Security
July 30, 2020 | 10:00 A.M. PST A Nevada statute, which becomes effective on January 1, 2021, will revise state requirements relating to personall...

Serving Cybercrime Victims
Published on 05.29.2020
Serving Cybercrime Victims
Thursday, June 18, 2020 2:00 pm EDT The impact of cybercrime on the economy, personal lives, and our critical infrastructure is growing exponenti...

How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
Published on 04.13.2020
How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
April 27 | 11:00 a.m. EDT Join our team to learn more about our successful Consulting Members and what they do to protect their clients, includin...

Securing Home Networks & Small Office Equipment
Published on 04.09.2020
Securing Home Networks & Small Office Equipment
Many organizations are allowing employees to work from home in relation to the spread of Coronavirus (COVID-19). The CIS Telework and Small Offic...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions