All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter by Topic
1060 Results Found
1 - 10 of 1060 results
Published on 05.28.2024
2024 DBIR Findings & How the CIS Critical Security Controls Can Help to Mitigate Risk to Your OrganizationThis webinar will focus on the way the CIS Controls impact threats seen through incidents in breaches ad discussed in the 2024 Verizon DBIR.
Published on 05.28.2024
Episode 86: Evangelizing CIS's Message at RSAC 2024In episode 86, Sean Atkinson is live once again from Booth 4319 at RSAC 2024 talking to session presenters, passersby, and fellow CIS team member...
Published on 05.21.2024
CIS Benchmarks Volunteer Spotlight: Hardeep MehrotaraCIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part.
Published on 05.21.2024
Episode 85: Reenergizing Collective Action at RSAC 2024In episode 85 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss collective action in cybersecurity at RSAC 2024.
Published on 05.21.2024
Reasonable Cybersecurity: On the Need for a Definition"Reasonable cybersecurity" is a phrase that has broad implications across various sectors. But there hasn't been a definition for how to meet it....
Published on 05.17.2024
How Can SLTTs Defend Against Cyber Threats?U.S. SLTTs can use grants to strengthen their defenses against cyber threats. Learn how you can extend the power of your grant dollars in CIS Cyb...
Published on 05.14.2024
Episode 84: Why We Need to Define Reasonable CybersecurityIn episode 84 of Cybersecurity Where You Are, co-host Tony Sager defining reasonable cybersecurity with Brian de Vallance and Phyllis Lee.
Published on 05.13.2024
CIS Controls Volunteer Spotlight: Jackie KrzyzewskiVolunteers who contribute to the CIS Controls come from all backgrounds and with experiences. Hear Jackie Krzyzewski's story.
Published on 05.08.2024
Reasonable Cybersecurity GuideIn the United States, there is no specification of what an organization must do to meet reasonable cybersecurity. This guide seeks to do just tha...
Published on 05.08.2024
CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8 to MITRE Enterprise ATT&CK ...
Explore Related Cybersecurity Solutions
Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More