White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
251 Results Found
51 - 60 of 251 results
Published on 07.14.2023
Cybersecurity Quarterly Summer 2023The Summer 2023 issue of Cybersecurity Quarterly focuses on preventative security, or actionable steps that you can take to reduce your attack su...
Published on 05.24.2023
MS-ISAC Guide to DDoS AttacksIn this guide, the MS-ISAC discusses methods and techniques which CTAs use to generate a DDoS attack. It also recommends how to defend against a ...
Published on 05.17.2023
Internet of Things: Embedded Security GuidanceOur whitepaper helps IoT vendors provide embedded security on their devices by establishing a framework for protocol standards across constrained...
Published on 04.28.2023
Acceptable Use Policy Template for the CIS ControlsCIS has released an Acceptable Use Policy Template that's meant to supplement the CIS Critical Security Controls (CIS Controls) v8.
Published on 04.18.2023
Living Off the Land: Scheduled TasksLiving off the Land (LotL) attacks involve the use of existing tools and tactics on targeted systems or networks to carry out a cyber attack, ren...
Published on 04.10.2023
Cybersecurity Quarterly Spring 2023The Spring 2023 issue of Cybersecurity Quarterly focuses on collaboration, with articles discussing the 20th anniversary of the MS-ISAC, our coll...
Published on 03.31.2023
2022 Year in ReviewFor CIS, 2022 was a year of tremendous growth and major accomplishments. Our 2022 Year in Review tells the full story.
Published on 03.31.2023
Security Awareness Skills Training Policy Template for CIS Control 14CIS has released a Security Awareness Training Policy Template to supplement CIS Control 14 of the CIS Critical Security Controls v8.
Published on 03.28.2023
RABET-V Final Pilot Summary and Next StepsCIS wraps up the final pilot of RABET-V as it works to make the process a permanent, operational interest within the election community.
Published on 03.22.2023
Data Recovery Policy Template for CIS Control 11CIS has released a Data Recovery Policy Template to supplement CIS Control 11 of the CIS Critical Security Controls v8.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More