Filter by Topic

248 Results Found
81 - 90 of 248 results
CIS Software Supply Chain Security Guide
Published on 08.31.2022
CIS Software Supply Chain Security Guide
The CIS Software Supply Chain Guide can assist individuals build and deploy software updates through automated means of DevOps pipelines.

CIS Controls Mapping to Payment Card Industry (PCI)
Published on 08.29.2022
CIS Controls Mapping to Payment Card Industry (PCI)
This document contains mappings of the CIS Controls and Safeguards to Payment Card Industry (PCI) Data Security Standard, v4.0.

CIS Controls v8 Mapping to NCSC Cyber Assessment Framework v3.1
Published on 08.29.2022
CIS Controls v8 Mapping to NCSC Cyber Assessment Framework v3.1
This document contains mappings of the CIS Controls and Safeguards to National Cyber Security Centre (NCSC) Cyber Assessment Framework v3.1.

CIS Critical Security Controls v8 Cybersecurity Maturity Model Certification Mapping
Published on 08.26.2022
CIS Critical Security Controls v8 Cybersecurity Maturity Model Certification Mapping
CIS Controls v8 are mapped to the Cybersecurity Maturity Model Certification (CMMC) levels to help organizations required to meet CMMC requiremen...

CIS Controls v8 Mapping to NYDFS Part 500
Published on 08.25.2022
CIS Controls v8 Mapping to NYDFS Part 500
CIS Controls mapping to New York Department of Financial Services 23 NYCRR Part 500.

Living off the Land: Powershell
Published on 08.01.2022
Living off the Land: Powershell
PowerShell is a robust tool that helps IT professionals automate a range of tedious and time- consuming administrative tasks as well as find, fi...

Cybersecurity Quarterly Summer 2022
Published on 07.06.2022
Cybersecurity Quarterly Summer 2022
The Summer 2022 issue of Cybersecurity Quarterly focuses on assessing risk and preparing for cyber attacks, with articles discussing tips to quic...

Enterprise Asset Management Policy Template
Published on 06.29.2022
Enterprise Asset Management Policy Template
Using the CIS Critical Security Controls v8 as a starting point, enterprises can create an effective enterprise asset management policy.

CIS Critical Security Controls v8 Poster
Published on 06.10.2022
CIS Critical Security Controls v8 Poster
Learn about the implementation groups and essential cyber hygiene with this downloadable poster.

CIS Controls v8 Privacy Companion Guide (Portuguese Translation)
Published on 05.31.2022
CIS Controls v8 Privacy Companion Guide (Portuguese Translation)
The CIS Controls v8 Privacy Companion Guide identifies opportunities to integrate privacy considerations into data security controls.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions