CIS Controls were designed to create a workflow of best practices to mitigate the most common attacks known on the market. With CIS’ recent release of version 7.1, CyberCompass now integrates these Top 20 controls . Our automated cyber risk management platform simplifies and reduces the effort for clients and consulting firms to perform CCPA, CIS-20, GDPR, HIPAA, NIST SP800-171, NYDFS and SECURETexas assessments affordably.
Our risk management plan provides:
  • multiple assessments
  • prioritized corrective actions
  • step-by-step guides
  • cyber training
  • policies and procedures
  • strategic plans
  • vendor compliance
These and other great features will help your organization perform rapid remediation to reduce your cyber risk.

CyberCompass has implemented all three implementation groups, IG1, IG2 and IG3 of the CIS Top 20 Controls in the platform. We have also created IG1.5 for companies in between the IG1 and IG2 needs

About CIS
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices.  To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.

Check out this blog to learn more about cybersecurity and threats around the world.

cyber hygiene

Get your cyber hygiene checklists today!

Please tell us a little about yourself

Thank you for downloading our checklists

Download the case study

Learn more about how CyberCompass has helped companies just like you!

Thank you for downloading our case study

Download the case study

Learn more about how CyberCompass has helped companies just like you!

Thank you for downloading our case study

Share This