Filter by Topic

76 Results Found
1 - 10 of 76 results
Countering Multidimensional Threats: Lessons Learned from the 2024 Election
Published on 11.19.2024
Countering Multidimensional Threats: Lessons Learned from the 2024 Election
In this webinar election, intelligence, and law enforcement experts will discuss lessons of the 2024 election and how you can transform the resp...

Cloud Desktop Resilience Blueprint: Expert Insights and Strategies
Published on 10.29.2024
Cloud Desktop Resilience Blueprint: Expert Insights and Strategies
Learn about the common pitfalls in managing cloud desktops, tips for enhancing resilience, and strategies to keep stay ahead of emerging threats.

The Rise of Reasonable Security
Published on 10.28.2024
The Rise of Reasonable Security
In this webinar, technical, legal, and public policy experts discuss reasonable security issues, challenges, examples on progress, and opportunit...

Maximizing Cloud Security and Efficiency with Nerdio and CIS Hardened Images
Published on 10.22.2024
Maximizing Cloud Security and Efficiency with Nerdio and CIS Hardened Images
Looking to secure your cloud environment and maintain compliance? Join our webinar with C3 Integrated Solutions and Nerdio to explore practical s...

Uncovering Gaps: Enhancing Cloud Security Posture Management
Published on 10.15.2024
Uncovering Gaps: Enhancing Cloud Security Posture Management
This webinar focuses on cloud security posture management and offers an overview of resources to help you enhance the security of your cloud infr...

How Executives Make Informed Cyber Decisions
Published on 09.10.2024
How Executives Make Informed Cyber Decisions
Non-technical executives can truly own cybersecurity when their companies measure, monitor, and manage cybersecurity risk like other parts of the...

Spotlight on Healthcare Cybersecurity: How to Effectively Prepare for Regulatory Change
Published on 08.22.2024
Spotlight on Healthcare Cybersecurity: How to Effectively Prepare for Regulatory Change
The healthcare industry has been under siege by cyber threat actors. Attend this webinar to learn about the state of the industry, pending regula...

How to Develop a “Reasonable” Cyber Defense Program
Published on 08.07.2024
How to Develop a “Reasonable” Cyber Defense Program
Looking to meet the standard of "reasonable" cyber defense? Check out this webinar to learn how a CIS SecureSuite Membership can help!

Add Value to Your Bottom Line with CIS SecureSuite
Published on 07.30.2024
Add Value to Your Bottom Line with CIS SecureSuite
In this webinar, we'll explain how a CIS SecureSuite Consulting and Services Membership can support the cybersecurity goals of you and your clien...

Balancing Risks, Rewards, and Remediation
Published on 07.11.2024
Balancing Risks, Rewards, and Remediation
In this installment of Qualys' Cyber Risk Series, join CIS's Sean Atkinson as he discusses balancing risks, rewards, and remediation in patch man...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions