Filter by Topic

71 Results Found
41 - 50 of 71 results
Open Source Content Management Systems
Published on 01.19.2021
Open Source Content Management Systems
Previously presented on February 11, 2021 | 3:00 pm EST What Attendees Learned: A discussion of the big three open source Content Management Syst...

Understanding Open Source Anonymizing Tools
Published on 11.13.2020
Understanding Open Source Anonymizing Tools
Previously presented on: December 3, 2020 | 3:00 pm ET During this webinar, attendees were introduced to some of the concepts regarding three maj...

Reduce Security Breaches with 6 Basic & Simple Steps
Published on 10.22.2020
Reduce Security Breaches with 6 Basic & Simple Steps
Wednesday, October 28 | 2:00 P.M. EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask, “Wh...

The 2020 Verizon Data Breach Investigations Report (DBIR)
Published on 07.22.2020
The 2020 Verizon Data Breach Investigations Report (DBIR)
Thursday, August 6th | 2:00 pm It’s that time of the year again as we’re presented with another Verizon Data Breach Investigations Report. This a...

How Nevada Can Spotlight its Leadership in Data Security
Published on 07.17.2020
How Nevada Can Spotlight its Leadership in Data Security
July 30, 2020 | 10:00 A.M. PST A Nevada statute, which becomes effective on January 1, 2021, will revise state requirements relating to personall...

Serving Cybercrime Victims
Published on 05.29.2020
Serving Cybercrime Victims
Thursday, June 18, 2020 2:00 pm EDT The impact of cybercrime on the economy, personal lives, and our critical infrastructure is growing exponenti...

How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
Published on 04.13.2020
How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
April 27 | 11:00 a.m. EDT Join our team to learn more about our successful Consulting Members and what they do to protect their clients, includin...

Securing Home Networks & Small Office Equipment
Published on 04.09.2020
Securing Home Networks & Small Office Equipment
Many organizations are allowing employees to work from home in relation to the spread of Coronavirus (COVID-19). The CIS Telework and Small Offic...

The First Severe Pandemic of the Information Age
Published on 03.18.2020
The First Severe Pandemic of the Information Age
Wednesday, March 25, 2020 2:00 pm EDT Chief Information Officers have a unique set of responsibilities in a pandemic. They far exceed the normal ...

2019 Nationwide Cybersecurity Review (NCSR)
Published on 08.26.2019
2019 Nationwide Cybersecurity Review (NCSR)
Friday, September 20, 2019 | 2:00 PM EST Join the MS-ISAC team as they provide an overview of what the Nationwide Cybersecurity Review is and to ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions