Filter by Topic

73 Results Found
61 - 70 of 73 results
CIS Benchmark Tailoring via the CIS WorkBench
Published on 03.26.2019
CIS Benchmark Tailoring via the CIS WorkBench
Interested in tailoring/customizing a CIS Benchmark? Watch this 30-minute presentation as the CIS technical team provide the basics of customizin...

Breaches Are Everywhere: What Should a Good Security Leader Do?
Published on 02.05.2019
Breaches Are Everywhere: What Should a Good Security Leader Do?
Wednesday, February 20, 2019 | 3:00 pm EST Breaches are on the news seemingly weekly, as organizations are struggling to secure their data. Phish...

New Features of CIS-CAT® Pro Assessor v4
Published on 10.24.2018
New Features of CIS-CAT® Pro Assessor v4
November 8, 2018 CIS-CAT® Pro Assessor v4 is a system configuration and vulnerability assessment tool. It provides the ability to remotely or loc...

Foundational Cybersecurity as the First Step Toward Compliance
Published on 10.23.2018
Foundational Cybersecurity as the First Step Toward Compliance
October 23, 2018 | 2:00 PM EDT Organizations often use multiple regulatory frameworks to guide their cybersecurity strategy. No matter which fram...

Ballot Check – Securing Election Systems Beyond the Perimeter
Published on 10.03.2018
Ballot Check – Securing Election Systems Beyond the Perimeter
Tuesday, October 30 at 11:30 am EST | Live at the 2018 Symantec Symposium Recent elections at all levels of government have raised eyebrows on wh...

How to Tailor CIS Benchmarks via CIS WorkBench
Published on 10.03.2018
How to Tailor CIS Benchmarks via CIS WorkBench
October 16, 2018 | 9:30 AM and 3:00 PM (EDT) While October has a special focus on cybersecurity, CIS works year-round to provide new resources fo...

CIS Controls Implementation Guide for Industrial Control Systems Launch Event
Published on 06.11.2018
CIS Controls Implementation Guide for Industrial Control Systems Launch Event
June 28, 2018 at 10:00 am EDT This webinar will discuss the CIS Controls Version 7 and the unique constraints and opportunities in Industrial Con...

CIS RAM v1.0 (Risk Assessment Method) Launch Event
Published on 04.30.2018
CIS RAM v1.0 (Risk Assessment Method) Launch Event
April 30, 2018 CIS RAM v1.0 (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps o...

CIS Controls Version 7 Launch Event
Published on 03.19.2018
CIS Controls Version 7 Launch Event
March 19, 2018 The CIS ControlsTM are a prioritized set of actions any organization can follow to improve their cybersecurity posture. CIS Contro...

Excellence in the Essentials: Managing Complexity through Foundational Controls
Published on 02.23.2018
Excellence in the Essentials: Managing Complexity through Foundational Controls
Thursday, March 8 | 2:00 pm EST Cybersecurity is a chaotic and complex field. From new threats to evolving compliance requirements to a noisy, cr...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions