White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
248 Results Found
41 - 50 of 248 results
Published on 11.01.2023
2022 Nationwide Cybersecurity Review Summary ReportThe 2022 NCSR Summary Report helps SLTT decision makers understand their risk tolerance and maturity. Explore our findings today.
Published on 10.10.2023
Ransomware Defense-in-DepthThis guide explores how SLTTs can mitigate the threat of ransomware using a defense-in-depth strategy as members of the MS- and EI-ISACs.
Published on 10.10.2023
Cybersecurity Quarterly Fall 2023The Fall 2023 issue of Cybersecurity Quarterly focuses on providing you with some recommendations on how to protect your organization from cyber ...
Published on 09.28.2023
Implementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1This guide helps SME to fast-track their adoption of IG1 of the CIS Controls, thereby rapidly strengthening their cyber defenses.
Published on 09.21.2023
2023 Kids Safe Online Activity BookThe MS-ISAC has released its 2023 book of cybersecurity activities for students to help them stay safe and secure online.[…]
Published on 08.03.2023
The Cost of Cyber Defense: CIS Controls IG1The Cost of Cyber Defense: Implementation Group 1 (IG1) shows how realistic and cost effective it can be for you to achieve essential cyber hygie...
Published on 07.28.2023
How to Plan a Cybersecurity Roadmap in 4 StepsCIS SecureSuite Membership includes everything you need to plot a cybersecurity roadmap. Download our white paper to learn more.
Published on 07.14.2023
Cybersecurity Quarterly Summer 2023The Summer 2023 issue of Cybersecurity Quarterly focuses on preventative security, or actionable steps that you can take to reduce your attack su...
Published on 05.24.2023
MS-ISAC Guide to DDoS AttacksIn this guide, the MS-ISAC discusses methods and techniques which CTAs use to generate a DDoS attack. It also recommends how to defend against a ...
Published on 05.17.2023
Internet of Things: Embedded Security GuidanceOur whitepaper helps IoT vendors provide embedded security on their devices by establishing a framework for protocol standards across constrained...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More