By Lauren Knisley | Jan 31, 2023 | Product of the Month, Uncategorized

What is CIS Controls v8?

SecuirtyCIS Controls v8 defines Implementation Group 1 (IG1) as basic cyber hygiene and represents an emerging minimum standard of information security for all enterprises. IG1 is the on-ramp to the CIS Controls and consists of a foundational set of 56 cyber defense Safeguards. The Safeguards included in IG1 are what every enterprise should apply to defend against the most common attacks.

 

How can CTI help?

CTI SHIELDControls Express is a two (2) day engagement leveraging Center for Internet Security (CIS®) Critical Security Controls and their concept of Implementation Groups (IG) to assist organizations get started on establishing their Cybersecurity Program. This analysis will quickly start an organization down the path to establishing a robust Cybersecurity Program. Register below to attend our upcoming lunch and learn.

 

Who is Center for Internet Security (CIS®)

The Center for Internet Security (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls® and CIS Benchmarks™, globally recognized best practices for securing IT systems and data.

Request More Information!

 

CIS Lunch and Learn – Thursday, February 23rd from 11:30 am to 1:00 pm

Want to learn more? Consider attending our Lunch and Learn on Thursday, February 23rd from 11:30 am to 1:00 pm at our office. Lunch will be provided by the Best BBQ in Maryland, Andy Nelson’s. During the Lunch and Learn you will hear from cybersecurity experts on how your organization can leverage the Center for Internet Security (CIS®) platform as you grow and manage your company’s Information Security Program. We hope to see you there!

 

Register here to RSVP!

 

 

What is SHIELDCybersecurity Solutions?

CTI’s SHIELD Suite encompasses all of CTI’s Consulting Services offerings. Our portfolio of customized assessments identify and prioritize your business requirements, match IT technologies and processes to business drivers, and deliver actionable recommendations to increase your productivity and reduce costs.

SECURITY HEALTHCHECKS
INTERNAL EVALUATIONS
LOGISTICAL DOCUMENTATION