Filter by Topic

71 Results Found
21 - 30 of 71 results
Connecticut’s New Approach to Improving Cybersecurity
Published on 11.03.2021
Connecticut’s New Approach to Improving Cybersecurity
Previously presented on Monday, November 8, 2021 | 12:00 p.m. EST A new Connecticut statute, which became effective on October 1, 2021, provides ...

CIS Risk Assessment Method (RAM) v2.0 Webinar
Published on 10.28.2021
CIS Risk Assessment Method (RAM) v2.0 Webinar
Previously presented on Wednesday, November 17, 2021 | 3:00 p.m. EST CIS RAM v2.0 (Center for Internet Security® Risk Assessment Method) is an in...

Protecting Hospitals Against Advanced Cyber Threats
Published on 10.27.2021
Protecting Hospitals Against Advanced Cyber Threats
Previously presented on Tuesday, September 14, 2021 | 2:00 p.m. EDT With the increasing industry shift to electronic health records and other dig...

CIS Endpoint Security Services – C-Level Roundtable Discussion
Published on 09.30.2021
CIS Endpoint Security Services – C-Level Roundtable Discussion
Thursday, October 21, 2021 CIOs, CISOs, CTOs and other senior technology leaders executives face many challenges as it relates to securing their ...

Defending Today’s Workforce with CIS Endpoint Security Services
Published on 09.29.2021
Defending Today’s Workforce with CIS Endpoint Security Services
Previously presented on Wednesday, October 13, 2021 | 1:30 pm EDT U.S. State, Local, Tribal, and Territorial (SLTT) organizations face a signific...

ISAC National Webinar: The Next Generation Software Solution As Ecosystem for Land and Community Development
Published on 09.17.2021
ISAC National Webinar: The Next Generation Software Solution As Ecosystem for Land and Community Development
Previously presented on Thursday, October 7th | 2:00 pm EDT The COVID-19 pandemic has fundamentally changed how land-management and community-dev...

ISAC National Webinar: The Call is Coming From Inside the House – Understanding the Insider Threat
Published on 07.12.2021
ISAC National Webinar: The Call is Coming From Inside the House – Understanding the Insider Threat
Previously presented on Tuesday, August 10th | 2:00 pm EDT The risks posed by insider threats are not new. In fact, they’ve represented some of t...

Modern CTO Podcast | The Role of Nonprofits in Cyber Defense
Published on 07.09.2021
Modern CTO Podcast | The Role of Nonprofits in Cyber Defense
Previously aired About this Episode Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center f...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions