White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
258 Results Found
181 - 190 of 258 results
Published on 09.06.2019
Overview This white paper provides information on general malware operations, IDS event types, requirements, recommendations, and references. Tec...
Published on 08.27.2019
Routers, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are dev...
Published on 08.18.2019
Organizations rely on different cybersecurity products and services to help bolster their defenses. By comparing available services with best pra...
Published on 07.16.2019
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.
Published on 07.10.2019
This document contains examples of methods for tracking hardware, software, and sensitive information in an organization.
Published on 07.10.2019
This guide provides detailed information on how to accomplish each of the CIS Sub-Controls within Implementation Group 1 (IG1). This guide builds...
Published on 06.27.2019
Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.
Published on 06.27.2019
The purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Controls v7.1 in asso...
Published on 06.21.2019
The TrickBot banking trojan is an increasingly common threat to SLTT governments. As shown to the right, it has steadily climbed the MS-ISAC Top ...
Published on 06.10.2019
Read how in 2018, CIS demonstrated the importance in its role as an independent, global leader in cybersecurity.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More