Filter by Topic

77 Results Found
51 - 60 of 77 results
Understanding Open Source Anonymizing Tools
Published on 11.13.2020
Previously presented on: December 3, 2020 | 3:00 pm ET During this webinar, attendees were introduced to some of the concepts regarding three maj...

Reduce Security Breaches with 6 Basic & Simple Steps
Published on 10.22.2020
Wednesday, October 28 | 2:00 P.M. EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask, “Wh...

The 2020 Verizon Data Breach Investigations Report (DBIR)
Published on 07.22.2020
Thursday, August 6th | 2:00 pm It’s that time of the year again as we’re presented with another Verizon Data Breach Investigations Report. This a...

How Nevada Can Spotlight its Leadership in Data Security
Published on 07.17.2020
July 30, 2020 | 10:00 A.M. PST A Nevada statute, which becomes effective on January 1, 2021, will revise state requirements relating to personall...

Serving Cybercrime Victims
Published on 05.29.2020
Thursday, June 18, 2020 2:00 pm EDT The impact of cybercrime on the economy, personal lives, and our critical infrastructure is growing exponenti...

How CIS SecureSuite Can Help Services and Consulting Members Increase ROI
Published on 04.13.2020
April 27 | 11:00 a.m. EDT Join our team to learn more about our successful Consulting Members and what they do to protect their clients, includin...

Securing Home Networks & Small Office Equipment
Published on 04.09.2020
Many organizations are allowing employees to work from home in relation to the spread of Coronavirus (COVID-19). The CIS Telework and Small Offic...

The First Severe Pandemic of the Information Age
Published on 03.18.2020
Wednesday, March 25, 2020 2:00 pm EDT Chief Information Officers have a unique set of responsibilities in a pandemic. They far exceed the normal ...

2019 Nationwide Cybersecurity Review (NCSR)
Published on 08.26.2019
Friday, September 20, 2019 | 2:00 PM EST Join the MS-ISAC team as they provide an overview of what the Nationwide Cybersecurity Review is and to ...

If You Build it They Will Comply: Getting the Most Out of Cybersecurity Policy Templates
Published on 08.26.2019
Friday, September 13, 2019 | 2:00 PM EDT Looking for a way to quickly improve your security? Do you want to increase your compliance scores? Woul...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions