Filter by Topic

76 Results Found
51 - 60 of 76 results
Reduce Security Breaches with 6 Basic & Simple Steps
Published on 10.22.2020
Reduce Security Breaches with 6 Basic & Simple Steps
Wednesday, October 28 | 2:00 P.M. EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask, “Wh...

The 2020 Verizon Data Breach Investigations Report (DBIR)
Published on 07.22.2020
The 2020 Verizon Data Breach Investigations Report (DBIR)
Thursday, August 6th | 2:00 pm It’s that time of the year again as we’re presented with another Verizon Data Breach Investigations Report. This a...

How Nevada Can Spotlight its Leadership in Data Security
Published on 07.17.2020
How Nevada Can Spotlight its Leadership in Data Security
July 30, 2020 | 10:00 A.M. PST A Nevada statute, which becomes effective on January 1, 2021, will revise state requirements relating to personall...

Serving Cybercrime Victims
Published on 05.29.2020
Serving Cybercrime Victims
Thursday, June 18, 2020 2:00 pm EDT The impact of cybercrime on the economy, personal lives, and our critical infrastructure is growing exponenti...

How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
Published on 04.13.2020
How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
April 27 | 11:00 a.m. EDT Join our team to learn more about our successful Consulting Members and what they do to protect their clients, includin...

Securing Home Networks & Small Office Equipment
Published on 04.09.2020
Securing Home Networks & Small Office Equipment
Many organizations are allowing employees to work from home in relation to the spread of Coronavirus (COVID-19). The CIS Telework and Small Offic...

The First Severe Pandemic of the Information Age
Published on 03.18.2020
The First Severe Pandemic of the Information Age
Wednesday, March 25, 2020 2:00 pm EDT Chief Information Officers have a unique set of responsibilities in a pandemic. They far exceed the normal ...

2019 Nationwide Cybersecurity Review (NCSR)
Published on 08.26.2019
2019 Nationwide Cybersecurity Review (NCSR)
Friday, September 20, 2019 | 2:00 PM EST Join the MS-ISAC team as they provide an overview of what the Nationwide Cybersecurity Review is and to ...

If You Build it They Will Comply: Getting the Most Out of Cybersecurity Policy Templates
Published on 08.26.2019
If You Build it They Will Comply: Getting the Most Out of Cybersecurity Policy Templates
Friday, September 13, 2019 | 2:00 PM EDT Looking for a way to quickly improve your security? Do you want to increase your compliance scores? Woul...

Learn about CIS Controls Implementation Groups and the Controls Assessment Module
Published on 08.14.2019
Learn about CIS Controls Implementation Groups and the Controls Assessment Module
Thursday, August 29, 2019 | 2:00 PM, EDT The CIS Controls Implementation Groups (IG) are self-assessed based on your organization’s resources and...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions