White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
248 Results Found
171 - 180 of 248 results
Published on 09.06.2019
Security Event Primer – MalwareOverview This white paper provides information on general malware operations, IDS event types, requirements, recommendations, and references. Tec...
Published on 08.27.2019
CIS Critical Security Controls v7.1 Telework and Small Office Network Security GuideRouters, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are dev...
Published on 08.18.2019
Public Sector Cyber Defense GuideOrganizations rely on different cybersecurity products and services to help bolster their defenses. By comparing available services with best pra...
Published on 07.16.2019
CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.
Published on 07.10.2019
CIS Hardware and Software Asset Tracking SpreadsheetThis document contains examples of methods for tracking hardware, software, and sensitive information in an organization.
Published on 07.10.2019
CIS Critical Security Controls v7.1 Microsoft Windows 10 Cyber Hygiene GuideThis guide provides detailed information on how to accomplish each of the CIS Sub-Controls within Implementation Group 1 (IG1). This guide builds...
Published on 06.27.2019
CIS Controls Internet of Things Companion Guide Mapping ApplicabilityUse this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.
Published on 06.27.2019
CIS Controls v7.1 Internet of Things Companion GuideThe purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Controls v7.1 in asso...
Published on 06.21.2019
Summer 2019 Threat of the Quarter: TrickBotThe TrickBot banking trojan is an increasingly common threat to SLTT governments. As shown to the right, it has steadily climbed the MS-ISAC Top ...
Published on 06.10.2019
2018 Year in ReviewRead how in 2018, CIS demonstrated the importance in its role as an independent, global leader in cybersecurity.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More