Webinars
Learn with our webinars and access previously recorded events
Filter by Topic
71 Results Found
21 - 30 of 71 results
Published on 11.03.2021
Connecticut’s New Approach to Improving CybersecurityPreviously presented on Monday, November 8, 2021 | 12:00 p.m. EST A new Connecticut statute, which became effective on October 1, 2021, provides ...
Published on 10.28.2021
CIS Risk Assessment Method (RAM) v2.0 WebinarPreviously presented on Wednesday, November 17, 2021 | 3:00 p.m. EST CIS RAM v2.0 (Center for Internet Security® Risk Assessment Method) is an in...
Published on 10.27.2021
Protecting Hospitals Against Advanced Cyber ThreatsPreviously presented on Tuesday, September 14, 2021 | 2:00 p.m. EDT With the increasing industry shift to electronic health records and other dig...
Published on 09.30.2021
CIS Endpoint Security Services – C-Level Roundtable DiscussionThursday, October 21, 2021 CIOs, CISOs, CTOs and other senior technology leaders executives face many challenges as it relates to securing their ...
Published on 09.29.2021
Defending Today’s Workforce with CIS Endpoint Security ServicesPreviously presented on Wednesday, October 13, 2021 | 1:30 pm EDT U.S. State, Local, Tribal, and Territorial (SLTT) organizations face a signific...
Published on 09.29.2021
Plan Your Cybersecurity Roadmap with the Nationwide Cybersecurity Review (NCSR)Published on 09.17.2021
ISAC National Webinar: The Next Generation Software Solution As Ecosystem for Land and Community DevelopmentPreviously presented on Thursday, October 7th | 2:00 pm EDT The COVID-19 pandemic has fundamentally changed how land-management and community-dev...
Published on 07.12.2021
ISAC National Webinar: The Call is Coming From Inside the House – Understanding the Insider ThreatPreviously presented on Tuesday, August 10th | 2:00 pm EDT The risks posed by insider threats are not new. In fact, they’ve represented some of t...
Published on 07.09.2021
Modern CTO Podcast | The Role of Nonprofits in Cyber DefensePreviously aired About this Episode Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center f...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More