Skip to main content
Center for Internet Security (CIS) Critical Security Controls



Center for Internet Security (CIS) Critical Security Controls

CIS is a non-profit organization that develops Configuration Policy Benchmarks that allow businesses to improve security and compliance programs and postures.

Its CIS Controls™ and CIS Benchmarks™ are the worldwide standard and accepted best practices for securing IT systems and data against the most pervasive attacks. These demonstrated guidelines are continuously refined and verified by a global community of volunteers who are experienced IT professionals. CIS also acts as home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary


December 14, 2017

What a Hacker Sees: Top 20 CIS Critical Security Controls

Learn about the top 20 CIS Critical Security Controls (CSC) through the eyes of a hacker.

See Details

May 18, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 1

Security is hard. Organizations are facing a growing threat, and breaches are becoming commonplace, even happening to companies trying to do everythin...

See Details

July 31, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20

Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an at...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.