www.cisecurity.org Open in urlscan Pro
104.18.29.89  Public Scan

Submitted URL: http://cisecurity.org/
Effective URL: https://www.cisecurity.org/
Submission: On June 20 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This website uses cookies

You’re here because you take cybersecurity seriously, and so does CIS. The
information we track while users are on our websites helps us analyze site
traffic, optimize site performance, improve our services, and identify new
products and services of interest to our users. To learn more please see
our Privacy Policy.

AcceptDecline

You need to enable JavaScript to run this app.
[NEW] A Guide to Defining Reasonable Cybersecurity | Learn More
CIS Hardened ImagesSupportCIS WorkBench Sign In
Alert Level: guarded
Company
Back
Company
Who We AreCIS is an independent, nonprofit organization with a mission to create
confidence in the connected world.

About Us
Leadership Principles
Leadership Team
Testimonials
Media
Events
Contact Us

Solutions
Back
Solutions
Secure Your Organization
CIS Critical Security ControlsPrioritized & simplified best practices
CIS Controls CommunityHelp develop and maintain the Controls
CIS RAMInformation security risk assessment method
CIS CSATAssess & measure Controls implementation
Secure Specific Platforms
CIS Benchmarks™100+ vendor-neutral configuration guides
CIS Benchmarks CommunityDevelop & update secure configuration guides
CIS-CAT®ProAssess system conformance to CIS Benchmarks
CIS Hardened Images®Virtual images hardened to CIS Benchmarks on cloud service
provider marketplaces
CIS SecureSuite®Start secure and stay secure with integrated cybersecurity tools
and resources designed to help you implement CIS Benchmarks and CIS Controls
Learn MoreApply Now
U.S. State, Local, Tribal & Territorial Governments
Memberships
MS-ISAC®Cybersecurity resource for SLTT Governments
EI-ISAC®Election-focused cyber defense suite
Elections
Election Security Tools And ResourcesSources to support the cybersecurity needs
of the election community
Services for Members
Albert Network Monitoring®Cost-effective Intrusion Detection System
Managed Security ServicesSecurity monitoring of enterprises devices
CIS Endpoint Security ServicesDevice-level protection and response
CIS CyberMarket®Savings on training and software
Malicious Domain Blocking and Reporting PlusPrevent connection to harmful web
domains
View All CIS Services
View All Products & Services
Insights
Back
Insights
InsightsExplore trending articles, expert perspectives, real-world applications,
and more from the best minds in cybersecurity and IT.

Advisories
Blog
Case Studies
Spotlights
Newsletters
Podcasts
Webinars
Whitepapers
View All Insights
Join CIS
Back
Join CIS
Get InvolvedJoin us on our mission to secure online experiences for all. Become
a CIS member, partner, or volunteer—and explore our career opportunities.

CIS SecureSuite® Membership
Multi-State ISAC (MS-ISAC®)
Elections Infrastructure ISAC (EI-ISAC®)
CIS CyberMarket® Vendors
CIS Communities
Careers





CREATING CONFIDENCE IN THE CONNECTED WORLD™


AT CIS®, WE’RE HARNESSING THE POWER OF THE GLOBAL IT COMMUNITY TO SAFEGUARD
PUBLIC AND PRIVATE ORGANIZATIONS AGAINST CYBER THREATS. JOIN US.

FEATURED


[WEBINAR] CIS SECURESUITE MEMBERSHIP

Improve your cybersecurity with CIS Controls and CIS Benchmarks tools and
resources. Join us June 25 to learn more!

Register
Our Industries

CYBERSECURITY THREATS AND SOLUTIONS BY INDUSTRY

View Industry List
From The Blog 06.06.2024
CIS Benchmarks Community Volunteer Spotlight: William FergusonRead More



WORLD-RENOWNED BEST PRACTICES AND EXPERT COMMUNITIES

Protect your organization from cyber-attacks with globally recognized CIS
Controls, companion guides, and mappings.
Download & Explore
Safeguard IT systems against cyber threats with more than 100 configuration
guidelines across more than 25 vendor product families.
Download Latest
Secure your organization with resources and tools designed to harness the power
of CIS Benchmarks and CIS Controls.
Learn More
Access resources for threat prevention, protection, response, and recovery for
U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More


WHAT THE EXPERTS ARE SAYING

 * The CIS Controls take the background and knowledge of cybersecurity experts
   literally around the world and help focus efforts on things that are of most
   value. Directly impacting the adversaries and challenges we face today on our
   networks.
   Harley Parkes
   Director, ACD (Integrated Adaptive Cyber Defense)
 * Without this resource, the hardening of our devices would have taken a lot
   longer and required many meetings between IT and Security to debate which
   configuration settings to change and the impact they could have. The CIS
   Benchmarks provided the necessary information to alleviate many of the fears
   IT may have had with changing specific settings.
   Adam
   Banking Information Security Engineer
 * We work with sensitive information on a daily basis. The CIS Controls along
   with CIS-CAT Pro, a proven and indispensable tool, helps us to evaluate and
   maintain a security baseline for our IT infrastructure.
   Sasawat Malaivongs
   Business Director, ACinfotec

 * 
 * 
 * 


TOGETHER, WE CAN MAKE A DIFFERENCE

Our CIS Controls and CIS Benchmarks communities connect IT security
practitioners from around the globe to help secure our ever-changing world. Our
Ambassadors champion the CIS best practices, making it easier for enterprises
everywhere to strengthen their cyber defenses and streamline their compliance
efforts. We hope you’ll add your voice.
Learn More


WHY WE DO WHAT WE DO

At CIS, we believe in secure online experiences for all. We’re driven by our
mission to develop, validate, and promote timely best practice solutions that
help people, businesses, and governments protect themselves against pervasive
cyber threats.

About Us 


INFORMATION HUB


WHAT'S NEW

Advisory18.06.2024
2024-073: Multiple Vulnerabilities in VMware Products Could Allow for Remote
Code Execution
Read More
Advisory12.06.2024
2024-072: Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary
Code Execution
Read More
Media Mention07.06.2024
What does Net Neutrality mean, and what are the implications for social media
and American Society?
Read More
Blog Post06.06.2024
CIS Benchmarks Community Volunteer Spotlight: William Ferguson
Read More
About
Leadership
Board
Communities
Careers
Media
Testimonials
Events
US Cyber Challenge
Support
Contact
Products And Tools
CIS Critical Security Controls®
CIS Benchmarks™
CIS Hardened Images®
CIS SecureSuite®

CIS-CAT®Lite
CIS-CAT®Pro
CIS RAM
CIS CSAT
CIS WorkBench
For SLTT Governments
MS-ISAC®
EI-ISAC®
Election Resources

CIS Services®
Albert Network Monitoring
Managed Security Services
Endpoint Security Services
Malicious Domain Blocking and Reporting Plus

CIS CyberMarket®
Explore
Blog
Whitepapers
Newsletters
Webinars
Case Studies
Spotlights
Videos

Copyright © 2024 Center for Internet Security®

Privacy Notice
TwitterFacebookYouTubeLinkedIn