www.cisecurity.org Open in urlscan Pro
68.232.34.125  Public Scan

Submitted URL: https://lnks.gd/l/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkI...
Effective URL: https://www.cisecurity.org/ms-isac/
Submission: On September 30 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.cisecurity.org/

<form autocomplete="off" class="main_search_form" role="search" method="get" id="form_desktop_search" action="https://www.cisecurity.org/">
  <input class="homepage_search_input" style="border:0;background-color:rgba(255,255,255,0); display:inline-block;padding:.5em;padding-left:1.5em;width:545px;" title="search" type="text" placeholder="" name="s" id="input_desktop_search" value="">
  <span id="desktop_search" class="btn btn-primary pull-right main_search_button pointer_cursor" style="padding:.5em;border-radius:5px;padding-left:.75em;padding-right:.95em;">
    <img class="pointer_cursor " alt="search" src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-search-blue.svg" style="display:inline;width:1.4em;">
  </span>
</form>

GET https://www.cisecurity.org/

<form autocomplete="off" class="main_search_form" role="search" method="get" id="form_mobile_search" action="https://www.cisecurity.org/">
  <table style="background-color:#eee; width:100%">
    <tbody>
      <tr>
        <td style="vertical-align: middle;padding:.75em;">
          <img class="pointer_cursor main_search_button " alt="Search" id="mobile_search" src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-search-mobile-blue.svg" style="padding-right:1em;">
          <input class="homepage_search_input" style="border:0;background-color:rgba(255,255,255,0); width:70%;display:inline;" title="search" type="search" placeholder="" name="s" id="input_mobile_search" value="">
          <a class="pointer_cursor search_toggle nav_close_button pull-right" style="font-size:1.5em;font-weight:bold;padding-top:.075em;padding-right:.5em;">×</a>
          <!--                                    <img class="search_toggle pointer_cursor pull-right"  src="/wp-content/themes/cis/assets/new-navigation/icons/nav-icon-mobile-close_search.svg" style="font-size:1.5em;padding-right:1em;display:inline;">-->
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

This website uses cookies

You’re here because you take cybersecurity seriously, and so does CIS. The
information we track while users are on our websites helps us analyze site
traffic, optimize site performance, improve our services, and identify new
products and services of interest to our users. To learn more please see
our Privacy Policy.

AcceptDecline

x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn
more
  Back ×
Why CIS Solutions Join CIS Resources

--------------------------------------------------------------------------------

CIS WorkBench Sign-in CIS Hardened Images Support
Alert Level: Guarded




WHY CIS

WHO WE ARE

CIS is an independent, nonprofit organization with a mission to create
confidence in the connected world

--------------------------------------------------------------------------------


About Us Leadership Principles Testimonials


SOLUTIONS

SECURE YOUR ORGANIZATION

--------------------------------------------------------------------------------


CIS Controls®

Prioritized & simplified best practices

CIS Controls Community

Help develop and maintain the Controls

CIS RAM

Information security risk assessment method

CIS CSAT

Assess & measure Controls implementation

SECURE SPECIFIC PLATFORMS

--------------------------------------------------------------------------------


CIS Benchmarks™

100+ vendor-neutral configuration guides

CIS Benchmarks Community

Develop & update secure configuration guides

CIS-CAT®

Assess system conformance to CIS Benchmarks

CIS Hardened Images®

Virtual images hardened to CIS Benchmarks

CIS SecureSuite®

Start secure and stay secure with integrated cybersecurity tools and resources
designed to help you implement CIS Benchmarks and CIS Controls

Learn More      Apply Now  

U.S. STATE, LOCAL, TRIBAL & TERRITORIAL GOVERNMENTS

--------------------------------------------------------------------------------


MEMBERSHIPS

MS-ISAC®

Cybersecurity resource for SLTT Governments

EI-ISAC®

Election-focused cyber defense suite

SERVICES FOR MEMBERS

Albert Network Monitoring®

Cost-effective Intrusion Detection System

Managed Security Services

Security monitoring of enterprises devices

CIS CyberMarket®

Savings on training and software

Malicious Domain Blocking & Reporting

Prevent Connection to harmful web domains

View All CIS Services  
View All Products & Services  


JOIN CIS

GET INVOLVED

Join CIS as a member, partner, or volunteer - or explore our career
opportunities

--------------------------------------------------------------------------------


CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure
ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers


RESOURCES

RESOURCES

--------------------------------------------------------------------------------


Blog Advisories Newsletters Press Releases In The News Elections Resources

LEARN

--------------------------------------------------------------------------------


White Papers Webinars Case Studies Spotlights

FILTER BY TOPIC

--------------------------------------------------------------------------------


CIS Benchmarks™ CIS Controls® CIS Hardened Images® CIS Services® MS-ISAC®
EI-ISAC®
View All Resources  


CIS Hardened Images Support CIS WorkBench Sign-in Alert Level: Guarded



--------------------------------------------------------------------------------

Why CIS

WHO WE ARE

CIS is an independent, nonprofit organization with a mission to create
confidence in the connected world.

About Us Leadership Principles Testimonials

Solutions

SECURE YOUR ORGANIZATION

--------------------------------------------------------------------------------

CIS Controls®

Prioritized & simplified best practices

CIS RAM

Information security risk assessment method

CIS Controls Community

Help develop and maintain the Controls

CIS CSAT

Assess & measure Controls implementation

SECURE SPECIFIC PLATFORMS

--------------------------------------------------------------------------------

CIS Benchmarks™

100+ vendor-neutral configuration guides

CIS-CAT®

Assess system conformance to CIS Benchmarks

CIS Benchmarks Community

Develop & update secure configuration guides

CIS Hardened Images®

Virtual images hardened to CIS Benchmarks

CIS SecureSuite®

Start secure and stay secure with integrated cybersecurity tools and resources
designed to help you implement CIS Benchmarks and CIS Controls

Learn More      Apply Now  

U.S. STATE, LOCAL, TRIBAL & TERRITORIAL GOVERNMENTS

--------------------------------------------------------------------------------

MEMBERSHIPS

MS-ISAC®

Cybersecurity resource for SLTT Governments

EI-ISAC®

Election-focused cyber defense suite

SERVICES FOR MEMBERS

Albert Network Monitoring®

Cost-effective Intrusion Detection System

Managed Security Services

Security monitoring of enterprises devices

CIS CyberMarket®

Savings on training and software

Malicious Domain Blocking & Reporting

Prevent Connection to harmful web domains

View All CIS Services  

View All Products & Services  
Join CIS

GET INVOLVED

Join CIS as a member, partner, or volunteer - or explore our career
opportunities.

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure
ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

RESOURCES

--------------------------------------------------------------------------------

Blog Advisories Newsletters Press Releases In The News Elections Resources

LEARN

--------------------------------------------------------------------------------

White Papers Webinars Case Studies Spotlights

FILTER BY TOPIC

--------------------------------------------------------------------------------

CIS Benchmarks™ CIS Controls® CIS Hardened Images® CIS Services® MS-ISAC®
EI-ISAC®

View All Resources  


×

--------------------------------------------------------------------------------

Home • MS-ISAC


Join MS-ISAC® See list of members

The mission of the MS-ISAC is to improve the overall cybersecurity posture of
the nation's state, local, tribal and territorial governments through focused
cyber threat prevention, protection, response, and recovery.

Report an Incident SolarWinds Cyber-Attack Updates Microsoft Exchange Zero-Day
Updates
Learn More about the Alert Level
See Our FAQ Read the MS-ISAC Mission & Charter

SERVICES INCLUDED WITH MEMBERSHIP

 * 24/7 Security Operation Center
 * Incident Response Services
 * Cybersecurity Advisories and Notifications
 * Access to Secure Portals for Communication and Document Sharing
 * Cyber Alert Map
 * Malicious Code Analysis Platform (MCAP)

 * Weekly Top Malicious Domains/IP Report
 * Monthly Members-only Webcasts
 * Access to Cybersecurity Table-top Exercises
 * Vulnerability Management Program (VMP)
 * Nationwide Cyber Security Review (NCSR)
 * Awareness and Education Materials

MS-ISAC Cyber Alert Level:

GUARDED

See All Services
Learn More about the Alert Level
All U.S. SLTTs are now eligible for a FREE CIS SecureSuite Membership! Learn
more & Apply today!
Election Infrastructure Security Learn more & Apply today!
View past MS-ISAC Webinars!






MS-ISAC NEWSLETTERS, WEBCAST ANNOUNCEMENTS, AND ADVISORIES

Subscribe

LATEST MS-ISAC RESOURCES

See all
CONTROL: 1 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Media mention • 30 Sep 2021
Center for Internet Security issues version 2.0 of ‘community defense model,’
prioritizing controls against prevalent attacks
CONTROL: 2 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

White paper • 29 Sep 2021
CIS Community Defense Model 2.0
CONTROL: 3 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Blog post • 29 Sep 2021
CIS Introduces v2.0 of the CIS Community Defense Model
CONTROL: 4 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Press-release • 29 Sep 2021
Center for Internet Security (CIS) Releases Community Defense Model v2.0 for
Cybersecurity

See Our Cybersecurity Threats Page Network Monitoring & Analysis Security
Assessment & Consulting

TRAINING OPPORTUNITIES

 

--------------------------------------------------------------------------------

FED-VTE

Over 900 hours of free cybersecurity training for any government employee or
veteran.
Enroll Now

SANS COURSES

Receive discounts on SANS and more through CIS CyberMarket.Learn more

WEBINAR •

Stay up-to-date with emerging cybersecurity threats and topics.Learn more


OUR PARTNERS


 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 



INFORMATION HUB : ADVISORIES




--------------------------------------------------------------------------------


CONTROL: 1 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Advisory • 28 Sep 2021
Multiple Vulnerabilities in Microsoft Edge Could Allow for Arbitrary Code
Execution
CONTROL: 2 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Advisory • 27 Sep 2021
A Vulnerability in SonicWall SMA 100 Series Could Allow for Arbitrary File
Deletion
CONTROL: 3 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Advisory • 24 Sep 2021
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
CONTROL: 4 --- ADVISORY CONTROL: 0

--------------------------------------------------------------------------------

Advisory • 23 Sep 2021
Multiple Vulnerabilities in Nagios Could Allow for Remote Code Execution

 * About us
 * Leadership
 * Board
 * Jobs
 * Media
 * Testimonials
 * Events
 * Contact
 * Member Support
   

 * Programs & Memberships
 * CIS Communities
 * CIS Benchmarks™
 * CIS Controls®
 * CIS SecureSuite®
 * MS-ISAC®
 * EI-ISAC®

 * Tools
 * CIS-CAT®Lite
 * CIS-CAT®Pro
 * CIS WorkBench
 * CIS RAM
 * CIS CSAT

 * Services
 * CIS Hardened Images®
 * Network Monitoring – Albert
 * CIS CyberMarket®

 * Resources
 * Blog
   
 * Case Studies
 * Newsletters
 * Videos
 * Webinars
 * Whitepapers
 * US Cyber Challenge
 * CyberCompEx
 * Elections Resources




Copyright © 2021
Center for Internet Security®
Privacy Policy