Filter by Topic

71 Results Found
11 - 20 of 71 results
Effective Implementation of the CIS Benchmarks and CIS Controls
Published on 06.20.2023
Effective Implementation of the CIS Benchmarks and CIS Controls
It’s not unusual to be challenged by limited time, resources, or even knowing where to start when developing your cybersecurity plan.  CIS Secure...

CIS RAM v2.1: A Way to Demonstrate Reasonable Security
Published on 05.22.2023
CIS RAM v2.1: A Way to Demonstrate Reasonable Security
CIS RAM v2.1 (Center for Internet Security® Risk Assessment Method) is increasingly used by regulators as a way to demonstrate reasonable […]

RABET-V Launch Event
Published on 03.24.2023
RABET-V Launch Event
The RABET-V Launch Event summarizes the pilot phase, offers community viewpoints, and discusses upcoming work. […]

CIS-CAT Pro Dashboard version 3
Published on 12.20.2022
CIS-CAT Pro Dashboard version 3
Join this webinar as we educate Members on new information regarding CIS-CAT Pro Dashboard version 3. […]

Secure Healthcare Organizations from Ransomware Attacks with CIS and AWS
Published on 07.19.2022
Secure Healthcare Organizations from Ransomware Attacks with CIS and AWS
Subject matter experts fro CIS and AWS will discuss the unique healthcare threat landscape and solutions that can help healthcare organizations m...

State of GovTech: How the Cloud Supports the Hybrid Government Workforce
Published on 07.06.2022
State of GovTech: How the Cloud Supports the Hybrid Government Workforce
Previously presented on Wednesday June 15, 2022 | 2:00 p.m. EDT Hosted by GovLoop, and co-sponsored by the Center for Internet Security and Red ...

CIS RAM v2.1 for Implementation Group 3 (IG3) Workshop
Published on 05.18.2022
CIS RAM v2.1 for Implementation Group 3 (IG3) Workshop
The CIS RAM v2.1 for IG3 workshop will provide a step-by-step tutorial of the activities an IG3 enterprise will take to conduct a risk assessment...

Can ‘Best of Breed’ Security Tools Be Orchestrated?
Published on 03.10.2022
Can ‘Best of Breed’ Security Tools Be Orchestrated?
The OCA is pleased to announce the first 2022 information session, 16 March, 12 PM EDT, dealing squarely with the challenges presented by cyber t...

CIS Risk Assessment Method (RAM) v2.1 for Implementation Group 2 (IG2) Workshop
Published on 01.19.2022
CIS Risk Assessment Method (RAM) v2.1 for Implementation Group 2 (IG2) Workshop
CIS RAM v2.1 (Center for Internet Security® Risk Assessment Method) is an information risk assessment method designed to help justify investments...

SLTT Feedback: The State and Local Cybersecurity Grant Program
Published on 12.06.2021
SLTT Feedback: The State and Local Cybersecurity Grant Program
During the next two weeks, the MS-ISAC will be hosting four webinars to solicit stakeholder input and perspective from the SLTT (State, Local, Tr...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions