Practical Guidance for Implementing the Critical Security Controls


We've released a practical guidance document which provides an overview and introduction to the CIS Controls and includes background on the philosophy of the Controls and the community that develops the resources.

This entry was posted in Critical Security Controls on September 12, 2016 by Kimberly K

CIS Critical Security Controls Executive Summary

We've released a new document related to the Critical Security Controls which addresses feedback received from the community of Controls users.

This entry was posted in Critical Security Controls, CIS Critical Security Controls on September 07, 2016 by Kimberly K

Get to Know the CIS Critical Security Controls

The CIS Critical Security Controls have come a long way since 2008. Check out this infographic below to learn more about the Controls and how you can start using them to improve your cybersecurity posture today.

This entry was posted in Critical Security Controls, CIS Controls, CIS Critical Security Controls on August 15, 2016 by Kimberly K

Cybersecurity Training In Wyoming

A member of the CIS team will be in Wyoming August 10-12 conducting cybersecurity training for State Agencies, Local Government, Educational Institutions, General Public, Industry, & Private Businesses.

This entry was posted in Critical Security Controls, cybersecurity on August 05, 2016 by Kimberly K

Champion License: What You Need To Know About The Update

The Center for Internet Security is pleased to announce a restructuring of the Champion License to better accommodate widespread adoption of the Critical Security Controls. As an organization driven by strong relationships with our members and volunteers, we take the feedback from our community seriously. As always, the CIS Critical Controls are free for organizations using the resources to enhance their own cybersecurity posture. The Champion License is aimed at entities who are utilizing the Controls as part of a commercial service or product offering.

This entry was posted in Critical Security Controls on June 09, 2016 by Kimberly K

Cyber Hygiene: Take These 5 Steps to Cure Your Online Maladies