White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
241 Results Found
141 - 150 of 241 results
Published on 06.29.2020
Cybersecurity Quarterly Summer 2020The Summer 2020 issue of Cybersecurity Quarterly highlights the CIS Controls mapping in the 2020 Verizon DBIR, new mappings to the CIS Controls, ...
Published on 06.09.2020
Cloud Security and the Shared Responsibility ModelAccording to Gartner, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.” With high chances of user error, limi...
Published on 05.22.2020
CIS Critical Security Controls v7.1 Cybersecurity Maturity Model Certification MappingThe CIS Critical Security Controls v7.1 are mapped to the Cybersecurity Maturity Model Certification (CMMC) levels to help organizations required...
Published on 05.19.2020
Cybersecurity Awareness Month PostersSpread cybersecurity awareness in your office!
Published on 05.19.2020
Cybersecurity Awareness Month Posters (co-branded)Cybersecurity posters brought to you by the MS-ISAC
Published on 04.16.2020
Resource Guide for Cybersecurity During the COVID-19 PandemicAccording to the results of the CSO Pandemic Impact Survey, 61% of the security and IT leader respondents are concerned about an increase in cybe...
Published on 03.31.2020
CIS Critical Security Controls V7.1 Implementation GroupsThe CIS Critical Security Controls Implementation Groups take a “horizontal” look across all of the CIS Controls and identify a set of Sub-Contro...
Published on 03.30.2020
Cybersecurity Quarterly – Spring 2020The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 ...
Published on 03.03.2020
Intel Insight: How to Disable MacrosOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More