White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
258 Results Found
121 - 130 of 258 results
Published on 10.27.2021
This document contains mappings of the CIS Critical Security Controls and Safeguards to COBIT 19.
Published on 10.07.2021
The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...
Published on 09.29.2021
The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise...
Published on 09.02.2021
The purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Critical Security Con...
Published on 08.31.2021
This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996...
Published on 08.31.2021
This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.
Published on 07.01.2021
In this summer edition of Cybersecurity Quarterly, read about the latest enhancements to cybersecurity best practices with CIS Controls v8, prote...
Published on 06.28.2021
This publication was created by the National Association of State Procurement Officials (NASPO) and the NASCIO, representing Chief Information Of...
Published on 06.24.2021
Every October during Cyber Security Awareness Month (CSAM), the MS-ISAC conducts a national K-12 “Kids Safe Online” poster contest to encourage y...
Published on 06.09.2021
The CIS Critical Security Controls® are a prioritized set of actions which collectively form a defense-in-depth set of best practices that mitiga...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More