Cityscape Schools' Director of Technology, Brock Boggs couldn't have said it better: Silos are a thing of the past, and we need to work together as a cybersecurity community. Listen to episode 184 to learn what that looks like in practice from Brock and CIS's CISO, Sean Atkinson. https://bit.ly/3R5eIJp #CollectiveCyberDefense #BetterTogether #Cybersecurity
Center for Internet Security
Computer and Network Security
East Greenbush, New York 153,919 followers
Leading the global community to secure our ever-changing connected world.
About us
The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls® and CIS Benchmarks™, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®), which supports the rapidly changing cybersecurity needs of U.S. elections offices.
- Website
-
http://www.cisecurity.org
External link for Center for Internet Security
- Industry
- Computer and Network Security
- Company size
- 501-1,000 employees
- Headquarters
- East Greenbush, New York
- Type
- Nonprofit
- Founded
- 2000
- Specialties
- Vulnerability Identification, Mitigation, and Response, Security Benchmarks, Aggregate Purchasing Opportunities, Cyber Threat Warnings and Advisories, Cybersecurity Best Practices, Secure Configurations, Cloud Security, Cloud Computing, and Virtual Hardened Images
Locations
-
Primary
Get directions
31 Tech Valley Drive
East Greenbush, New York 12061, US
Employees at Center for Internet Security
Updates
-
Center for Internet Security reposted this
Security teams get asked a hard question: “Can you prove your cloud configurations are secure?” If this resonates with you, we invite you to join this session that covers how CIS Hardened Images and CIS Benchmarks work together to support secure, repeatable cloud deployments with defensible evidence of secure configuration, helping reduce misconfigurations and strengthen your posture over time. 📅 Mark your calendar and reserve your seat for May 20 at 1:30 PM ET: https://bit.ly/4dvewM8 #CloudCompliance #DevSecOps #SecurityPosture
-
Center for Internet Security reposted this
Security teams get asked a hard question: “Can you prove your cloud configurations are secure?” This session members-only webinar covers how CIS Hardened Images and CIS Benchmarks work together to support secure, repeatable cloud deployments. https://bit.ly/4uyCiwA #CloudCompliance #DevSecOps #SecurityPosture
-
Don't miss this webinar tomorrow!
Join the CIS team along with Astrix and Cequence on May 13 at 1:00 p.m. ET for our webinar: From Prompts to Protocols: The Security Blueprint for Enterprise AI. We’ll break down the new AI Companion Guides and share insights for securing LLMs, agents, and MCP‑based integrations. Save your spot now! https://bit.ly/4njiI51 #AI #AISecurity #AgenticAI
-
Cyber threat actors don’t operate alone. They collaborate across borders and networks, sharing tools, infrastructure, and tactics to scale attacks at speed. A single vulnerability anywhere in the ecosystem can quickly become a widespread incident. At the same time, many organizations still struggle to implement consistent cybersecurity safeguards. Talent shortages, fragmented tools, and complex environments make it difficult to stay ahead. Most breaches continue to exploit the basics: misconfigurations, weak credentials, unpatched systems, and the human element. This creates isolated cyber defenses that can’t keep pace with modern threats. Collective Cyber Defense offers a way forward for us all. It brings together people, intelligence, tools, and best practices for strengthening the entire ecosystem. By uniting organizations across sectors — public, private, nonprofit, education, and critical infrastructure — communities can defend better than any single organization alone. By facilitating the transformation of community expertise into practical, validated cybersecurity guidance and tools, CIS helps organizations build stronger baselines, detect threats faster, and respond with confidence. Discover how adopting this community-driven approach to cyber defense can strengthen your organization. https://bit.ly/4ss0Ndh #CollectiveCyberDefense
-
Cybersecurity is not a challenge any organization can solve alone. For state, local, tribal, and territorial governments, limited resources and growing threats make collaboration essential. The MS-ISAC recently reached a major milestone: more than 5,000 members working together to strengthen collective cyber defense. This SLTT community embodies the power of standing together, sharing insights, and supporting one another to strengthen defenses across jurisdictions and sectors in the face of evolving risk. #MSISAC #CollectiveCyberDefense #CyberResilience
Cyber resilience is built long before an incident occurs. It grows through trust, shared experience, and a commitment to supporting one another when challenges arise. With more than 5,000 MS-ISAC members, our community continues to demonstrate how collaboration and shared knowledge strengthen cyber readiness nationwide. Learn how this growing community stands strong together against an evolving threat landscape. https://bit.ly/3QVmvtb #CollectiveCyberDefense #MSISAC #PublicSectorCyber
-
-
When a cyber incident isn’t addressed quickly, the damage doesn’t stop at the initial breach. Delays can lead to prolonged system outages, loss of sensitive student and staff data, regulatory pressure, and erosion of trust across an entire school community. That’s why timely, coordinated response is critical. When the PowerSchool breach affected K–12 organizations nationwide, the MS-ISAC team provided trusted guidance to help education leaders assess risk, communicate clearly, and take informed action during a high‑pressure situation. This case study shows how coordinated support and proven best practices can reduce uncertainty and help organizations move forward with confidence. https://bit.ly/4wi0epp #CyberDefense #K12Tech #CollectiveCyberDefense
-
Security frameworks can feel overwhelming, but prioritization does not have to be. Join our webinar to learn how the CIS Critical Security Controls and CIS Benchmarks help you align your security program with regulatory and compliance requirements, while also strengthening real-world defense against attacks. Register to join us on May 19 at 9:00 A.M. ET to learn how to: Prioritize what matters most in your security program Assess and implement secure configurations at scale Use a CIS SecureSuite Membership to help secure systems and data https://bit.ly/4uyCiwA #Cybersecurity #Compliance #CISControls
-
Drones are changing the risk landscape for large public gatherings, and traditional security measures are no longer enough. Our report highlights how rapidly evolving UAS capabilities create gaps in detection, coordination, and response for state, local, tribal, and territorial governments. It also outlines what SLTTs need to better prepare for today’s airborne threats. Learn how we're helping public safety agencies address these emerging risks. https://bit.ly/3PcSMv7
-
HIPAA compliance alone doesn’t guarantee strong cybersecurity. That’s why the CIS SecureSuite Platform now maps the HIPAA Security Rule directly to the CIS Critical Security Controls, helping healthcare organizations turn regulatory requirements into prioritized, actionable security steps. Discover the ways CIS SecureSuite Platform can help transform your security and compliance efforts: https://bit.ly/4n9C1xu #HIPAACompliance #HealthcareCybersecurity #HIPAA