Filter by Topic

243 Results Found
91 - 100 of 243 results
Guide to Enterprise Assets and Software
Published on 04.06.2022
Guide to Enterprise Assets and Software
Adopters of the CIS Controls should use this guide as a reference during activities such as implementation or auditing to verify that all in-scop...

Cybersecurity Quarterly Spring 2022
Published on 04.05.2022
Cybersecurity Quarterly Spring 2022
The Spring 2022 issue of Cybersecurity Quarterly focuses on layered security and defense-in-depth.

Simplifying Security
Published on 03.28.2022
Simplifying Security
Scale is the most important consideration as industry transforms information security and assurance across our supply chains. 

CIS Controls v8 Cloud Companion Guide
Published on 03.25.2022
CIS Controls v8 Cloud Companion Guide
Instruction for applying best practices to enterprise systems.

SLTT Input to the State and Local Cybersecurity Grant Program
Published on 03.11.2022
SLTT Input to the State and Local Cybersecurity Grant Program
SLTT Perspectives to Inform the State and Local Cybersecurity Grant Program

CIS Controls v8 Mapping to Criminal Justice Information Services
Published on 03.07.2022
CIS Controls v8 Mapping to Criminal Justice Information Services
The methodology used to create the mapping can be useful to anyone attempting to understand the relationships between the CIS Controls and the CJ...

From Russia…With Love? Part 2
Published on 02.10.2022
From Russia…With Love? Part 2
Part 2 highlights how the Russian government's influence in cybercrime impacts the SLTT community.

From Russia…With Love? Part 1
Published on 02.10.2022
From Russia…With Love? Part 1
Part 1 highlights the history of Russian governmental influence in cybercrime up to the present day.

CIS Controls v8 Mapping to NERC-CIP
Published on 02.10.2022
CIS Controls v8 Mapping to NERC-CIP
This page describes the methodology used to map the CIS Controls to the North American Electric Reliability Corporation-Critical Infrastructure P...

CIS RAM (Risk Assessment Method)
Published on 02.04.2022
CIS RAM (Risk Assessment Method)
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk assessment method that helps organizations impleme...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions