CIS Controls were designed to help companies follow a workflow of best practices to proactively defend againt the most common attacks known on the market. With CIS’ recent release of version 7.1, CyberCompass® now integrates these Top 20 controls . Our automated cyber risk management platform simplifies and reduces the effort for our clients needing to comply with CCPA, CIS-20, GDPR, HIPAA, NIST SP800-171, NYDFS and SECURETexas assessments.
Our risk management plan provides:
- multiple assessments
- prioritized corrective actions
- step-by-step guides
- cyber training
- policies and procedures
- strategic plans
- vendor compliance
These and other great features will empower your organization to reduce your cyber risk.
CyberCompass® has implemented all three implementation groups, IG1, IG2 and IG3 of the CIS Top 20 Controls in the platform. We have also created IG1.5 for companies in between the IG1 and IG2 needs
If your company is expected to comply with the framework of CIS-20, call us today to plan your assessment and begin your journey toward cyber resilience.
About CIS
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images™ are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.