It looks like this is a web page, not a feed. I looked for a feed associated with this page, but couldn't find one. Please enter the address of your feed to validate.

Source: http://msisac.cisecurity.org/daily-tips/rss-tip.xml?.rss

  1. <!DOCTYPE html><html data-unhead-vue-server-rendered  lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="VirtualFolder" content="/"><link rel="apple-touch-icon" sizes="180x180" href="/dist/cisecurity/img/icons/apple-touch-icon.png"><link rel="icon" type="image/png" sizes="32x32" href="/dist/cisecurity/img/icons/favicon-32x32.png"><link rel="icon" type="image/png" sizes="16x16" href="/dist/cisecurity/img/icons/favicon-16x16.png"><link rel="manifest" href="/dist/cisecurity/img/icons/site.webmanifest.json"><link rel="mask-icon" href="/dist/cisecurity/img/icons/safari-pinned-tab.svg" color="#5bbad5"><link rel="shortcut icon" href="/dist/cisecurity/img/icons/favicon.ico"><link rel="stylesheet" href="https://use.typekit.net/nap2dtl.css"><meta name="msapplication-TileColor" content="#2b5797"><meta name="msapplication-config" content="/dist/cisecurity/img/icons/browserconfig.xml"><meta name="msapplication-TileImage" content="/dist/cisecurity/img/icons/mstile-150x150.png"><meta name="theme-color" content="#ffffff"><script src="https://cdn.optimizely.com/js/28546730169.js"></script><script defer="defer" src="/dist/cisecurity/js/js-cookie/2.2.1/js.cookie.min.js"></script><script defer="defer" src="https://code.jquery.com/jquery-3.6.0.min.js" integrity="sha256-/xUj+3OJU5yExlq6GSYGSHk7tPXikynS7ogEvDej/m4=" crossorigin="anonymous"></script><script defer="defer" src="https://code.jquery.com/jquery-migrate-3.4.0.min.js" integrity="sha256-mBCu5+bVfYzOqpYyK4jm30ZxAZRomuErKEFJFIyrwvM=" crossorigin="anonymous"></script><script id="Cookiebot" src="https://consent.cookiebot.com/uc.js" data-cbid="965d9c8b-6ef3-48b4-ba8f-11d8d9ba39c1" defer="defer"></script><script>window.addEventListener("CookiebotOnAccept",(function(){Cookiebot.consent.marketing&&-1==document.cookie.indexOf("SC_TRACKING_CONSENT")&&fetch("/api/cookieconsent/giveconsent")}),!1)</script><script defer="defer" type="module" src="/dist/cisecurity/js/chunk-vendors.8e402017.js"></script><script defer="defer" type="module" src="/dist/cisecurity/js/app.e655a4fa.js"></script><link href="/dist/cisecurity/css/app.454fef1f.css" rel="stylesheet"><script defer="defer" src="/dist/cisecurity/js/chunk-vendors-legacy.fba73fbc.js" nomodule></script><script defer="defer" src="/dist/cisecurity/js/app-legacy.da6874c6.js" nomodule></script><title>MS-ISAC</title><link rel="canonical" href="https://www.cisecurity.org/ms-isac"><meta name="description" content="The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments."><meta name="robots" content="index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1"><meta property="og:title" content="Multi-State Information Sharing and Analysis Center"><meta property="og:description" content="The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments."><meta property="og:image" content="/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2018/10/4.png?h=627&iar=0&w=1200&rev=49a0fee5eb964f41b1d0b518570b3c73&hash=3B87FBC7260A6CBC60C065CCAB924653"><meta property="og:image:width" content="1200"><meta property="og:image:height" content="627"><meta property="og:locale" content="en_US"><meta property="og:site_name" content="CIS"><meta property="og:type" content="article"><meta property="og:url" content="https://www.cisecurity.org/ms-isac/"><meta property="article:publisher" content="https://www.facebook.com/CenterforIntSec/"><meta property="article:modified_time" content="2021-11-22T16:23:00Z"><meta property="twitter:card" content="summary_large_image"><meta property="twitter:site" content="@CISecurity"><meta property="twitter:creator" content="@CISecurity"><meta property="twitter:title" content="MS-ISAC"><meta property="twitter:description" content="The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments."><meta property="twitter:image" content="/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2018/10/4.png?h=156&iar=0&w=300&rev=49a0fee5eb964f41b1d0b518570b3c73&hash=CC976C86FDCB03AEB1C11F94F3F2EFFC"><script type="application/ld+json" data-hid="4c21177">{&quot;@context&quot;:&quot;https:&#x2F;&#x2F;schema.org&quot;,&quot;@type&quot;:&quot;WebPage&quot;,&quot;name&quot;:&quot;MS-ISAC&quot;,&quot;description&quot;:&quot;The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments.&quot;,&quot;url&quot;:&quot;https:&#x2F;&#x2F;www.cisecurity.org&#x2F;ms-isac&quot;,&quot;image&quot;:&quot;&#x2F;-&#x2F;media&#x2F;project&#x2F;cisecurity&#x2F;cisecurity&#x2F;data&#x2F;media&#x2F;img&#x2F;uploads&#x2F;2018&#x2F;10&#x2F;4.png?h=156&amp;iar=0&amp;w=300&amp;rev=49a0fee5eb964f41b1d0b518570b3c73&amp;hash=CC976C86FDCB03AEB1C11F94F3F2EFFC&quot;,&quot;publisher&quot;:{&quot;@type&quot;:&quot;Organization&quot;,&quot;name&quot;:&quot;Center for Internet Security&quot;,&quot;telephone&quot;:&quot;518-266-3460&quot;,&quot;description&quot;:&quot;The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.&quot;,&quot;url&quot;:&quot;https:&#x2F;&#x2F;www.cisecurity.org&quot;,&quot;sameAs&quot;:[&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Center_for_Internet_Security&quot;,&quot;https:&#x2F;&#x2F;www.facebook.com&#x2F;CenterforIntSec&#x2F;&quot;,&quot;https:&#x2F;&#x2F;www.linkedin.com&#x2F;company&#x2F;the-center-for-internet-security&#x2F;&quot;,&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;user&#x2F;TheCISecurity&#x2F;&quot;,&quot;https:&#x2F;&#x2F;twitter.com&#x2F;CISecurity&#x2F;&quot;],&quot;address&quot;:{&quot;@type&quot;:&quot;PostalAddress&quot;,&quot;addressCountry&quot;:&quot;US&quot;,&quot;addressRegion&quot;:&quot;NY&quot;,&quot;addressLocality&quot;:&quot;East Greenbush&quot;,&quot;postalCode&quot;:&quot;12061&quot;,&quot;streetAddress&quot;:&quot;31 Tech Valley Drive&quot;},&quot;contactPoint&quot;:[{&quot;@type&quot;:&quot;ContactPoint&quot;,&quot;contactType&quot;:&quot;customer service&quot;,&quot;telephone&quot;:&quot;518-266-3460&quot;},{&quot;@type&quot;:&quot;ContactPoint&quot;,&quot;contactType&quot;:&quot;cybersecurity incident&quot;,&quot;telephone&quot;:&quot;866-787-4722&quot;}]}}</script></head><body ><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"><!--[--><div class="d-flex flex-column" data-v-2559b02d><!----></div><div class="c-site" data-v-1c346e14><!----><!----><!----><!----><!----><div class="c-site__banner" data-v-1c346e14><!--[--><!--[--><div data-v-1c346e14 data-v-9b401ec2><!--[--><!----><!--]--></div><!--]--><!--]--></div><header class="c-site__header" role="banner" data-v-1c346e14><div class="jss-placeholder" data-v-1c346e14><!--[--><!--[--><div data-v-1c346e14><a class="c-site__logo" href="/" target><!----><img alt="CIS Logo" width="300" height="86" class="c-site__logo--d" src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-logo.png?h=86&amp;iar=0&amp;w=300&amp;rev=7ed3ffb78afd465c969c97d743c66d1c&amp;hash=A51D01D4D383E4ACD170D4227BA4606B"></a><div class="c-site__nav-container"><div class="c-site__nav-container-padding"><div class="c-nav-controls"><button type="button" class="c-button__close" aria-label="Mobile Close Menu Button"></button></div><div class="c-header-utility" aria-label="Utility Navigation"><div class="c-header-utility__item"><!--[--><a class="c-header-utility__link c-header-utility__security" href="/cis-hardened-image-list" title target data-v-55e17df8>CIS Hardened Images®</a><a class="c-header-utility__link c-header-utility__support" href="/support" target data-v-55e17df8>Support</a><a class="c-header-utility__link c-header-utility__signin" href="https://workbench.cisecurity.org/" target data-v-55e17df8>CIS WorkBench Sign In</a><!--]--></div><!--[--><div class="c-header-utility__item c-alert" data-v-47d70404><div class="c-alert__level--blue c-alert__title" data-v-47d70404> Alert Level: <span class="c-alert__option" data-v-47d70404>guarded</span><span class="c-alert__button" data-v-47d70404></span></div><!----></div><!--]--></div><nav class="c-nav" role="navigation" aria-label="Main Navigation"><div class="c-nav__list"><!--[--><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/#/" title data-v-0e09efec>Company</a><div class="company c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Company</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Who We Are</span><span class="c-nav-dropdown__text">CIS is an independent, nonprofit organization with a mission to create confidence in the connected world.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us" title>About Us</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/cis-leadership-principles" title>Leadership Principles</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/leadership" title>Leadership Team</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/testimonials" title>Testimonials</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/media" title>Media</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/event-calendar" title>Events</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/contact-us" target>Contact Us</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/" target data-v-0e09efec>Solutions</a><div class="solutions c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Solutions</span><div class="c-nav-content" data-v-0e09efec><!--[--><div class="u-flex-full" data-v-0e09efec data-v-7c2506f0><div class="c-nav-dropdown__half" data-v-7c2506f0><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Icon" width="31" height="40" class="c-nav-dropdown__icon" src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-organization.svg?h=40&amp;iar=0&amp;w=31&amp;rev=3ac90ee26d3e44cb9933bfb4fe833319&amp;hash=F0300BD206B3EAE393C39355F9A7736B" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Your Organization</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/controls" title target>CIS Critical Security Controls®</a><span class="c-link-list__desc">Prioritized &amp; simplified best practices</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/communities/controls" title>CIS Controls Community</a><span class="c-link-list__desc">Help develop and maintain the Controls</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-ram" target>CIS RAM</a><span class="c-link-list__desc">Information security risk assessment method</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a><span class="c-link-list__desc">Assess &amp; measure Controls implementation</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Icon" width="40" height="35" class="c-nav-dropdown__icon" src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-platform.svg?h=35&amp;iar=0&amp;w=40&amp;rev=02136d0686ec492789175c18a4b66c5a&amp;hash=E2862B0C873D466C67AF6F3C745F8223" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Specific Platforms</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cis-benchmarks" title target>CIS Benchmarks™</a><span class="c-link-list__desc">100+ vendor-neutral configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/communities/benchmarks" title>CIS Benchmarks Community</a><span class="c-link-list__desc">Develop &amp; update secure configuration guides</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a><span class="c-link-list__desc">Assess system conformance to CIS Benchmarks</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/cis-hardened-images" title>CIS Hardened Images®</a><span class="c-link-list__desc">Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-edfd60ce><img alt="Situation" width="40" height="39" class="c-nav-dropdown__icon" src="/-/media/project/cisecurity/cisecurity/data/media/img/icon-situation.svg?h=39&amp;iar=0&amp;w=40&amp;rev=31c65e64a468409fa01c91555a6f1722&amp;hash=155E5BA7463CE12876E73DA3E417E247" data-v-edfd60ce><span class="c-nav-dropdown__headline" data-v-edfd60ce>Secure Your Situation</span><div class="c-link-list-half c-link-list" data-v-edfd60ce><!--[--><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/industry" title target>Industries</a><span class="c-link-list__desc">Your industry&#39;s specific threats and needs</span></div><div class="c-link-list__item" data-v-edfd60ce><a class="c-link-list__link" href="/topics" title target>Topics</a><span class="c-link-list__desc">Dive deeper into specific cybersecurity topics</span></div><!--]--></div></div><div class="c-nav-dropdown__links nav-with-icon bordered" data-v-7c2506f0><img alt="SecureSuite®" width="41" height="41" class="c-nav-dropdown__icon" src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-securesuite.svg?h=41&amp;iar=0&amp;w=41&amp;rev=c067c575dc7e48fa83e5a052d7029702&amp;hash=2F2655A91C693BD1463FD39D63A1349D"><!----><div class="c-link-list"><!--[--><div class="c-link-list__item" data-v-0a7ab6bc><div class="text-wrap" data-v-0a7ab6bc><a class="c-link-list__link" href="/cis-securesuite" title data-v-0a7ab6bc>CIS SecureSuite®</a><span class="c-link-list__desc" data-v-0a7ab6bc>Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls</span></div><div class="link-wrap" data-v-0a7ab6bc><a class="c-link-list__link--bottom c-cta--tertiary" href="/cis-securesuite" title data-v-0a7ab6bc>Learn More</a><a class="c-link-list__link--bottom c-cta--tertiary" href="https://enroll.cisecurity.org/memberships/#/" target data-v-0a7ab6bc>Apply Now</a></div></div><!--]--></div></div><!--]--></div><div class="c-nav-dropdown__half" data-v-7c2506f0><div class="nav-with-bg" data-v-7c2506f0><!--[--><div class="c-nav-dropdown__links nav-with-icon" data-v-7c2506f0 data-v-0de28657><img alt="U.S. State, Local, Tribal &amp; Territorial Governments" width="41" height="41" class="c-nav-dropdown__icon" src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/icon-government.svg?h=41&amp;iar=0&amp;w=41&amp;rev=16678d2dab0b478e97bd953706f9e35e&amp;hash=C18C652B4AC22AE85971DAFF9DD38A68" data-v-0de28657><span class="c-nav-dropdown__headline" data-v-0de28657>U.S. State, Local, Tribal &amp; Territorial Governments</span><div class="c-nav-dropdown__half" data-v-0de28657><div class="c-link-list" data-v-0de28657><!--[--><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Memberships</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/ms-isac" title>MS-ISAC®</a><span class="c-link-list__desc">Cybersecurity resource for SLTT Governments</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/ei-isac" title>EI-ISAC®</a><span class="c-link-list__desc">Election-focused cyber defense suite</span></div><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Elections</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/elections" title>Election Security Tools And Resources</a><span class="c-link-list__desc">Sources to support the cybersecurity needs of the election community</span></div><!--]--></div></div><div class="c-nav-dropdown__half" data-v-0de28657><div class="c-link-list" data-v-0de28657><!--[--><div data-v-0de28657><span class="c-nav-dropdown__subheadline">Services for Members</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/albert-network-monitoring" title>Albert Network Monitoring®</a><span class="c-link-list__desc">Cost-effective Intrusion Detection System</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/managed-security-services-mss" title>Managed Security Services</a><span class="c-link-list__desc">Security monitoring of enterprises devices</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/endpoint-security-services" title>CIS Endpoint Security Services</a><span class="c-link-list__desc">Device-level protection and response</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/cis-cybermarket" title>CIS CyberMarket®</a><span class="c-link-list__desc">Savings on training and software</span></div><div class="c-link-list__item" data-v-0de28657><a class="c-link-list__link" href="/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a><span class="c-link-list__desc">Prevent connection to harmful web domains</span></div><!--]--></div><a class="c-cta--tertiary" href="/services" title data-v-0de28657>View All CIS Services</a></div></div><!--]--></div><a class="c-cta--secondary" href="/cybersecurity-tools" title data-v-7c2506f0>View All Products &amp; Services</a></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/insights" title data-v-0e09efec>Insights</a><div class="insights c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="nav-full-width c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Insights</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Insights</span><span class="c-nav-dropdown__text">Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/advisory" title>Advisories</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/blog" title>Blog</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/case-study" title>Case Studies</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/spotlight" title>Spotlights</a><!----></div><!--]--></div><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/newsletter" title>Newsletters</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/podcast" title>Podcasts</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/webinar" title>Webinars</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/white-papers" title>Whitepapers</a><!----></div><!--]--></div><div class="c-link-list-bottom"><!--[--><div><a class="c-cta--secondary" href="/insights/all" title>View All Insights</a></div><!--]--></div></div></div><!--]--></div></div></div></div></div><div class="" data-v-0e09efec><div class="c-nav__item" data-v-0e09efec><a class="c-nav__link" aria-haspopup="true" aria-expanded="false" href="/" target data-v-0e09efec>Join CIS</a><div class="joincis c-nav-dropdown" aria-label="submenu" data-v-0e09efec><div class="c-nav-dropdown__container" data-v-0e09efec><div class="c-nav-controls" data-v-0e09efec><button type="button" class="c-button__back" data-v-0e09efec> Back </button><button type="button" class="c-button__close" aria-label="Mobile Back Button" data-v-0e09efec></button></div><span class="c-nav-dropdown__nav-title" data-v-0e09efec>Join CIS</span><div class="c-nav-content" data-v-0e09efec><!--[--><div data-v-0e09efec><div class="c-nav-dropdown__content"><span class="c-nav-dropdown__headline">Get Involved</span><span class="c-nav-dropdown__text">Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities.</span></div><div class="c-nav-dropdown__divider"></div><div class="c-nav-dropdown__links"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-securesuite" title>CIS SecureSuite® Membership</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/ms-isac" title>Multi-State ISAC (MS-ISAC®)</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/ei-isac" title>Elections Infrastructure ISAC (EI-ISAC®)</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/cis-cybermarket/vendor-information" title>CIS CyberMarket® Vendors</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="/communities" title>CIS Communities</a><!----></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://careers-cisecurity.icims.com/jobs/search?hashed=-626009842&amp;mobile=false&amp;width=1492&amp;height=500&amp;bga=true&amp;needsRedirect=false&amp;jan1offset=-300&amp;jun1offset=-240" target>Careers</a><!----></div><!--]--></div><div class="c-link-list"><!----></div><div class="c-link-list-bottom"><!----></div></div></div><!--]--></div></div></div></div></div><!--]--></div></nav></div></div><div class="c-site__search"><div class="wrapper"><button type="button" class="c-search-button" aria-label="Search Open Button"></button><input class="c-search-input" placeholder="" aria-label="Search"><button type="button" class="c-search-submit" aria-label="Search Submit Button"></button><button type="button" class="c-search-close" aria-label="Search Close Button"></button></div></div><button type="button" class="c-site__hamburger" aria-label="Mobile Hamburger Button"><span class="hamburger-inner"></span></button></div><!--]--><!--]--></div></header><main class="c-site__main" role="main" data-v-1c346e14><div class="jss-placeholder c-site__breadcrumb" data-v-1c346e14><!--[--><!--[--><div class="breadcrumb" data-v-1c346e14 data-v-368e2241><!--[--><!--[--><!--[--><a href="/" data-v-368e2241>Home</a><!--]--><!--]--><span data-v-368e2241>MS-ISAC</span><!--]--></div><!--]--><!--]--></div><div class="jss-placeholder c-site__content" data-v-1c346e14><!--[--><!--[--><div data-v-1c346e14 data-v-a84a72e4><!--[--><div class="row c-two-column" data-v-a84a72e4><div data-v-a84a72e4><!--[--><div class="c-masthead" data-v-a84a72e4 data-v-152a73d7><div class="c-masthead__inner" data-v-152a73d7><!----><h1 data-v-152a73d7>Multi-State Information Sharing and Analysis Center®</h1><h2 data-v-152a73d7>The mission of the MS-ISAC® is to improve the overall cybersecurity posture of U.S. State, Local, Tribal, and Territorial (SLTT) government organizations through coordination, collaboration, cooperation, and increased communication.</h2><!----><!----><a class="c-cta--primary" href="https://learn.cisecurity.org/ms-isac-registration" target data-v-152a73d7>Join the MS-ISAC</a><!----></div></div><div class="c-alert-secondary" data-v-a84a72e4 data-v-4d8e7b4f><div class="wrapper" data-v-4d8e7b4f><div class="c-alert-secondary-info" data-v-4d8e7b4f><div class="c-alert-secondary__tag" data-v-4d8e7b4f> Alert Level <span class="c-alert-secondary__level--blue c-alert-secondary__level" data-v-4d8e7b4f>guarded</span></div><div class="c-alert-secondary__description" data-v-4d8e7b4f>On September 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Apple and Google products. </div><a class="c-cta--secondary" href="/cybersecurity-threats/alert-level" title target data-v-4d8e7b4f>About this threat</a></div><div class="c-alert-secondary-levels" data-v-4d8e7b4f><span class="c-alert-secondary__moreinfo" data-v-4d8e7b4f>Learn what are the alert levels and how they can serve your organization</span><div class="alert-modal-link" data-v-4d8e7b4f> Alert Levels </div></div></div><!--teleport start--><!--teleport end--></div><!--]--></div></div><div class="row c-two-column" data-v-a84a72e4><div data-e2e-id="cis-resource-generic-page" style="position:relative;" class="col-lg-12 col-md-12 col-sm-12 template-content" data-v-a84a72e4><div class="col-lg-9 col-md-9 col-sm-12 template-main-content" data-v-a84a72e4><div class="" data-v-a84a72e4><!----><!----><!----></div><!--[--><div data-v-a84a72e4><script src="https://fast.wistia.com/embed/medias/q1f6qga5y0.jsonp" async></script>
  2. <script src="https://fast.wistia.com/assets/external/E-v1.js" async></script>
  3. <h2>MS-ISAC<sup>®</sup> at a glance</h2>
  4. <p>As a trusted cybersecurity partner for 17,000+ U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, we cultivate a collaborative environment for information sharing in support of our <a class="tooltip" tooltip="&lt;p&gt;&lt;strong&gt;MS-ISAC Mission&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The mission of the MS-ISAC is to improve the overall cybersecurity posture of the nation’s SLTTs governments through focused cyber threat prevention, protection, response, and recovery.&lt;/p&gt;">mission</a>. We offer members incident response and remediation support through our team of security experts and develop tactical, strategic, and operational intelligence, and advisories that offer actionable information for improving cyber maturity.</p>
  5. <p><span class="wistia_embed wistia_async_q1f6qga5y0 popover=true popoverContent=link" style="display: block; position: relative;"><a class="c-cta--tertiary">Watch video to learn more</a></span></p>
  6. <h3>Benefits</h3>
  7. <ul>
  8.    <li>24x7x365 Security Operations Center (SOC) offering threat intelligence, detection, and response assistance</li>
  9.    <li>Regular webinars examining critical and timely cybersecurity issues</li>
  10.    <li>Access to the Nationwide Cybersecurity Review (NCSR) to review your cybersecurity maturity</li>
  11.    <li>No-cost cybersecurity tools and resources, including a CIS SecureSuite Membership</li>
  12.    <li>Cybersecurity Advisories and Notifications</li>
  13.    <li>Access to Secure Portals for Communication and Document Sharing</li>
  14.    <li>Cyber Alert Map</li>
  15.    <li>Weekly Top Malicious Domains/IP Report</li>
  16.    <li>Monthly Members-only Webcasts</li>
  17. </ul>
  18. <br />
  19. <p><a class="c-cta--secondary" href="/ms-isac/services">Explore ms-isac Services</a></p></div><div class="image-carousel" data-v-a84a72e4><h2 class="image-carousel__title">Our Partners</h2><!----><div class="image-carousel__content"><!--[--><div class="splide" aria-label="Carousel"><div class="splide__track"><ul class="splide__list"><!--[--><!--[--><!--[--><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="US Department of Homeland Security" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/us-department-of-homeland-security.png?h=232&amp;iar=0&amp;w=390&amp;rev=7b716b68916f4f559464418157625cef&amp;hash=C96A4A5F68BDF8B2017367EE521A060E" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="US CERT" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/us-cert.png?h=232&amp;iar=0&amp;w=390&amp;rev=807b67e46732451889c05590ab3eaf15&amp;hash=A7EDCCE4FA9F30E8B4607464D17F36F3" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Stop Think Connect" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/07/stop-think-connect.png?h=232&amp;iar=0&amp;w=390&amp;rev=59cd7a9c08fd44759226fb115e129d01&amp;hash=2A543060620D68E8B1B3691B508F174A" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Nascio" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/nascio.png?h=232&amp;iar=0&amp;w=390&amp;rev=b51afeb0967b4c78a9cfd883dc822b41&amp;hash=03387FB48D9B2010270FA915EAFF6847" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Global Cyber Alliance" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/global-cyber-alliance.png?h=232&amp;iar=0&amp;w=390&amp;rev=1e9e0649c3344150bb59ea70ddd7400f&amp;hash=2E72D5E873343004E6154F78CE876325" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Water ISAC" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/water-isac.png?h=232&amp;iar=0&amp;w=390&amp;rev=6e4c3b2909ad4969975524e7d64c0af3&amp;hash=CBE9583B8AD9E770A11C60F21556506B" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="COSN" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/cosn.png?h=232&amp;iar=0&amp;w=390&amp;rev=a39944cddf2b4221932d58a04be1d153&amp;hash=9967046F3200560B7E0F58EE46D12B7F" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="NW3C" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/nw3c.png?h=232&amp;iar=0&amp;w=390&amp;rev=87310ab16fb440e18367a019ff249767&amp;hash=77326E6B7E25FBE32825EEE4D1946A14" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Cybercrime" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/cybercrime.png?h=232&amp;iar=0&amp;w=390&amp;rev=2a85d9ce04e24fc58538ea643f3d4c4c&amp;hash=51B66B77A19C10D27F5286F1C97C9CDF" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Cyber Threat Alliance" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/cyber-threat-alliance.png?h=232&amp;iar=0&amp;w=390&amp;rev=ea8d895e450b4febab8c298650ebd376&amp;hash=B6F5A504746A2834703430E2A85FB0D2" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="NFCA" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/nfca.png?h=232&amp;iar=0&amp;w=390&amp;rev=ee35e4483e914777b3b08e6d92788960&amp;hash=C2B7949C84AD355F1DD23855F79FB0FD" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="National Governors Association" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/national-governors-association.png?h=232&amp;iar=0&amp;w=390&amp;rev=e90c3eb6e8e54be8a75ed24f8780475a&amp;hash=4A242AC4EC7CE8463109FC43B69D2BBA" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="National Council Isacs" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/national-council-isacs.png?h=232&amp;iar=0&amp;w=390&amp;rev=18a7a43fb4e8421fb2f1cea53d569858&amp;hash=6D1DA7F1BEB8A1FE5DA83C46508244C6" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="PTI" width="326" height="138" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/pti.png?h=138&amp;iar=0&amp;w=326&amp;rev=0b6e4c2ada5a4b65acf4185a06ceaab2&amp;hash=61416C34F06A821086DE0D1866B6D228" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="E-ISAC" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/e-isac.png?h=232&amp;iar=0&amp;w=390&amp;rev=f193a0cf93a645469d65c7df6aae7480&amp;hash=97293C60A008DB8CF35ECC5D775A9CEF" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="NACo" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/naco.png?h=232&amp;iar=0&amp;w=390&amp;rev=399abfdb40dd4e5184b1736f097c247c&amp;hash=B9294985C58CFE4290C28EF44CBA0199" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="Global Resilience Federation" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/global-resilience-federation.png?h=232&amp;iar=0&amp;w=390&amp;rev=ec06d4fffeb940649f8053f9959d8338&amp;hash=999A019A124038E21D51B583C335695F" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><li class="splide__slide"><!--[--><div data-v-a84a72e4 data-v-0a94acba><div class="carousel-item__wrapper" data-v-0a94acba><img alt="DNG-ISAC" width="390" height="232" class="image-carousel__image" src="/-/media/project/cisecurity/cisecurity/data/media/img/partners-logos/2022/dng-isac.png?h=232&amp;iar=0&amp;w=390&amp;rev=e3b409c82651433a8ac66e586e3dfc3d&amp;hash=EFEF62A0FA6B9AA289DD06F37CDCBBCE" data-v-0a94acba><div class="center image-carousel__content" data-v-0a94acba><!----><!----><!----></div></div></div><!--]--></li><!--]--><!--]--><!--]--></ul></div></div><!--]--></div><div class="image-carousel__richtext"><script src="https://fast.wistia.com/embed/medias/rnvmw9538i.jsonp" async></script>
  20. <script src="https://fast.wistia.com/assets/external/E-v1.js" async></script>
  21. <p><span class="wistia_embed wistia_async_rnvmw9538i popover=true popoverContent=link" style="display: block; position: relative;"><a class="c-cta--tertiary">Watch Testimonial Video</a></span></p></div></div><div class="c-content-blue-box" data-v-a84a72e4 data-v-47b6decb><!----><div data-v-47b6decb><h3>Not a member yet?</h3>
  22. <p>Joining is easy, the MS-ISAC Membership is available at no cost and is open to all U.S. SLTT government organizations.</p>
  23. <p><a class="c-cta--primary" href="https://learn.cisecurity.org/ms-isac-registration">Join the MS-ISAC</a></p>
  24. <a class="c-cta--tertiary" href="/ms-isac/ms-isac-membership-faq">See Membership FAQs</a>
  25. <!-- <a class="c-cta--tertiary" href="/sitecore/service/notfound.aspx?item=web%3a%7b3D5A649E-BED7-FF89-009A-868F86D85BE5%7d%40en">See members list</a> -->
  26. <a class="c-cta--tertiary" href="/isac/report-an-incident">How To Report an Incident</a></div></div><!--]--><div class="resource-content" data-v-a84a72e4 data-v-aa4afcd2><!----></div><!----><!--[--><div data-v-a84a72e4><h2>CIS is home to the MS-ISAC</h2>
  27. <p>As an <a class="tooltip" tooltip="&lt;p&gt;&lt;strong&gt;What’s an ISAC?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;An Information Sharing and Analysis Center (ISAC) collects, analyzes, and disseminates actionable threat information to members and provides them with tools to mitigate risks and improve resiliency.&lt;/p&gt;">ISAC</a> member, you'll get access to a community that will help you stay up to date on cyber threats facing your industry.</p>
  28. <p>The MS-ISAC is federally funded by CISA and a division of the Center for Internet Security (CIS). The MS-ISAC is autonomously guided by its Executive Committee and member organizations.</p>
  29. <p>Learn how U.S. State, Local, Tribal, and Territorial (SLTT) entities can report a cybersecurity incident.</p>
  30. <br />
  31. <p><img src="/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2023/isac-circles.png?rev=2591d16c9651440f9029df82b8ccc8b9&amp;hash=66BFAD838BC2CEA5C3B2EAE3327C0A3B" alt="ISAC graph" /></p>
  32. <br /></div><div data-v-a84a72e4><h2>Election Related Resources</h2>
  33. <p>The Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) supports the rapidly changing cybersecurity needs of U.S. election offices.</p>
  34. <p><strong>Every U.S. election office that joins EI-ISAC automatically becomes a member of MS-ISAC.</strong></p>
  35. <a class="c-cta--tertiary" href="/ei-isac">Learn more about EI-ISAC</a>
  36. <br />
  37. <a class="c-cta--tertiary" href="/elections">Election Security Tools and Resources</a>
  38. <br /></div><!--]--></div><div class="col-lg-3 col-md-3 col-sm-12 template-sidebar" data-v-a84a72e4><div class="right-column-content" data-v-a84a72e4 data-v-54fee9b6><div data-v-54fee9b6><p><img src="/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2023/01/ms-isac--20th-anniversary--logo--large--600px.png?h=194&amp;w=350&amp;rev=5ac947a489a94f2a9af880a2331537ed&amp;hash=7B8AD697DAE12E708E112A9433AC8E85" alt="MS-ISAC: Multi-State Information Sharing & Analysis Center" style="width: 350px; height: 194px;" /></p>
  39. <h3>Already a member?</h3>
  40. <br />
  41. <p><a class="c-cta--secondary" href="/ms-isac/ms-isac-charter">View MS-ISAC Charter</a></p>
  42. <p><a class="c-cta--secondary" href="/ms-isac/ms-isac-charter/ms-isac-executive-committee">Meet our MS-ISAC Executive Committee</a></p>
  43. <p><a class="c-cta--secondary" href="/ms-isac/services">visit MS-ISAC Services</a></p>
  44. <p><a class="c-cta--secondary" href="/isac/report-an-incident">Report a cybersecurity Incident</a></p>
  45. <h3>Tackling Audits and Cloud Security Efficiently and at Scale</h3>
  46. <a class="c-cta--secondary" href="https://learn.cisecurity.org/CIS_SecureSuite-Case_Study-State_of_Minn">View Case Study</a>
  47. <h3>Cybersecurity threats updates and more</h3>
  48. <p>Get timely updates by CIS and  MS-ISAC cybersecurity experts on current online security threats and more.</p>
  49. <p>
  50. <a class="c-cta--tertiary" href="/cybersecurity-threats">Cybersecurity Threats Updates</a>
  51. <br />
  52. <a class="c-cta--tertiary" href="/log4j-zero-day-vulnerability-response">See all important Updates</a>
  53. </p>
  54. <h3>We value your questions and feedback</h3>
  55. <p>At CIS, we are committed to serving the greater IT security community.</p>
  56. <p><a class="c-cta--tertiary" href="https://learn.cisecurity.org/contact-us">Contact Us Today</a></p></div></div><!----><!----><!----></div></div></div><!--]--></div><!--]--><!--]--></div><div class="jss-placeholder c-site__infoHub" data-v-1c346e14><!--[--><!--[--><div class="c-infohub" data-v-1c346e14><div class="c-infohub__header"><h2>Information Hub</h2><h3>MS-ISAC</h3><!----></div><div class="c-infohub__inner"><!--[--><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Press Release</span><span class="c-infohub-link__date">09.19.2024</span></div><div class="c-infohub-link__inner"><a href="/about-us/media/press-release/cis-releases-results-of-18-month-study-of-us-tribal-organization-cybersecurity">CIS Releases Results of 18 Month Study of U.S. Tribal Organization Cybersecurity</a></div><div class="c-infohub-link__footer"><a href="/about-us/media/press-release/cis-releases-results-of-18-month-study-of-us-tribal-organization-cybersecurity">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">White Paper</span><span class="c-infohub-link__date">09.18.2024</span></div><div class="c-infohub-link__inner"><a href="/insights/white-papers/dmarc-guide-microsoft-365-and-google-workspace">DMARC Guide: Microsoft 365 and Google Workspace</a></div><div class="c-infohub-link__footer"><a href="/insights/white-papers/dmarc-guide-microsoft-365-and-google-workspace">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">09.18.2024</span></div><div class="c-infohub-link__inner"><a href="/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-103">2024-103: Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution</a></div><div class="c-infohub-link__footer"><a href="/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-103">Read More</a></div></div><div class="c-infohub-link"><div class="c-infohub-link__header"><span class="c-infohub-link__type">Advisory</span><span class="c-infohub-link__date">09.16.2024</span></div><div class="c-infohub-link__inner"><a href="/advisory/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2024-102">2024-102: Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution</a></div><div class="c-infohub-link__footer"><a href="/advisory/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2024-102">Read More</a></div></div><!--]--></div></div><!--]--><!--]--></div></main><footer class="c-site__footer" role="contentinfo" data-v-1c346e14><div class="jss-placeholder" data-v-1c346e14><!--[--><!--[--><div class="c-footer" data-v-1c346e14 data-v-5689c325><nav class="c-footer__nav" aria-label="Footer Navigation" data-v-5689c325><div data-v-5689c325><!--[--><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/about-us" title>About</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/leadership" title>Leadership</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/board" title>Board</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/communities" title>Communities</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="https://careers-cisecurity.icims.com/" target>Careers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/about-us/media" title>Media</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/testimonials" title>Testimonials</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/event-calendar" title>Events</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="http://www.uscyberchallenge.org/" target>US Cyber Challenge</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/support" title>Support</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/contact-us" target>Contact</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/cybersecurity-tools" title>Products And Tools</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/controls" title target>CIS Critical Security Controls®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-benchmarks" title>CIS Benchmarks™</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-hardened-images" title>CIS Hardened Images®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cis-securesuite" title>CIS SecureSuite®</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-cat-lite" target>CIS-CAT®Lite</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/cybersecurity-tools/cis-cat-pro" title>CIS-CAT®Pro</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://learn.cisecurity.org/cis-ram" target>CIS RAM</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/controls/cis-controls-self-assessment-tool-cis-csat" title>CIS CSAT</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="https://workbench.cisecurity.org/" target>CIS WorkBench</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/isac" title>For SLTT Governments</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/ms-isac" title>MS-ISAC®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/ei-isac" title>EI-ISAC®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/elections" title>Election Resources</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services" title target>CIS Services®</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/albert-network-monitoring" title>Albert Network Monitoring</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/managed-security-services-mss" title>Managed Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/endpoint-security-services" title>Endpoint Security Services</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/mdbrplus" title target>Malicious Domain Blocking and Reporting Plus</a></div><div class="c-link-list__item c-link-list__item--spacer"></div><div class="c-link-list__item"><a class="c-link-list__link" href="/services/cis-cybermarket" title>CIS CyberMarket®</a></div><!--]--></div></div></div><div class="c-nav__list" data-v-5689c325><a class="c-nav__header" href="/insights" title>Explore</a><div class="c-link-list-container"><div class="c-link-list"><!--[--><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/blog" title>Blog</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/white-papers" title>Whitepapers</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/newsletter" title>Newsletters</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/webinar" title>Webinars</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/case-study" title>Case Studies</a></div><div class="c-link-list__item"><a class="c-link-list__link" href="/insights/spotlight" title>Spotlights</a></div><div class="c-link-list__item"><a class="c-link-list__link" rel="noopener noreferrer" href="https://www.youtube.com/user/TheCISecurity" target="_blank">Videos</a></div><!--]--></div></div></div><!--]--></div></nav><div class="c-footer__global" data-v-5689c325><div class="c-footer__links" data-v-5689c325><!--[--><p class="c-footer__copyright" data-v-5689c325> Copyright © 2024 Center for Internet Security® </p><a class="c-footer__link" data-v-5689c325 href="/privacy-notice" title target>Privacy Notice</a><!--]--></div><div class="c-footer__social" data-v-5689c325><!--[--><a class="c-footer__icon twitter" rel="noopener noreferrer" data-v-5689c325 href="https://twitter.com/CISecurity/" target="_blank">Twitter</a><a class="c-footer__icon facebook" rel="noopener noreferrer" data-v-5689c325 href="https://www.facebook.com/CenterforIntSec/" target="_blank">Facebook</a><a class="c-footer__icon youtube" rel="noopener noreferrer" data-v-5689c325 href="https://www.youtube.com/user/TheCISecurity/" target="_blank">YouTube</a><a class="c-footer__icon linkedin" rel="noopener noreferrer" data-v-5689c325 href="https://www.linkedin.com/company/the-center-for-internet-security/" target="_blank">LinkedIn</a><!--]--></div></div></div><!--]--><!--]--></div></footer><!--[--><!--]--><!--teleport start--><!--teleport end--><!--teleport start--><!--teleport end--></div><!--]--></div><script type="application/json" id="__JSS_STATE__">{"sitecore":{"context":{"pageEditing":false,"site":{"name":"ngen-1"},"pageState":"normal","canonicalUrl":"https:\u002F\u002Fwww.cisecurity.org\u002Fms-isac","language":"en","itemPath":"\u002Fms-isac","commonRoutes":{"contactDetails":"\u002Fcontact-details","dashboard":"\u002Fdashboard","organizationDirectory":"\u002Fdirectory"}},"route":{"name":"ms-isac","displayName":"MS-ISAC","fields":{"centerPageTitle":{"value":false},"showRightRail":{"value":true},"canonicalUrl":{"value":"https:\u002F\u002Fwww.cisecurity.org\u002Fms-isac\u002F"},"cdnMaxAge":{"value":1800},"excludeFromSearch":{"value":false},"featuredImage":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2018\u002F10\u002F4.png?h=156&iar=0&w=300&rev=49a0fee5eb964f41b1d0b518570b3c73&hash=CC976C86FDCB03AEB1C11F94F3F2EFFC","alt":"MS-ISAC","width":"300","height":"156"}},"legacyUrl":{"value":"https:\u002F\u002Fwww.cisecurity.org\u002Fms-isac\u002F"},"pageDescription":{"value":"The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments."},"pageTitle":{"value":"MS-ISAC"},"robotsFollow":{"value":true},"robotsIndex":{"value":true},"robotsMaxImagePreview":{"value":"max-image-preview:large"},"robotsMaxSnippet":{"value":"max-snippet:-1"},"robotsMaxVideoPreview":{"value":"max-video-preview:-1"},"owners":[{"id":"d41df5f5-1997-5662-bbbb-4ae63430599e","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Ftaxonomies\u002Fowners\u002Fmsisac-owner","name":"msisac-owner","displayName":"MS-ISAC","fields":{"defaultImage":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fthumbnail-cis-ms-isac.png?h=360&iar=0&w=540&rev=a54505db5a1c4fd1ae20fe4ead238e4d&hash=B02305ADD513EEFB49980FAFDFFBA9CC","alt":"MS-ISAC","width":"540","height":"360"}},"description":{"value":""},"legacyID":{"value":125},"name":{"value":"MS-ISAC"},"slug":{"value":"ms-isac"}}},{"id":"58bcbbdf-6877-560e-96f1-5f2358637bd1","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Ftaxonomies\u002Fowners\u002Fcis-securesuite-owner","name":"cis-securesuite-owner","displayName":"CIS SecureSuite","fields":{"defaultImage":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fthumbnail-cis-securesuite.png?h=360&iar=0&w=540&rev=8ea97442dd8846a3b493a3681f4e6f81&hash=6F46993D1C4ADDEEF15AB52A4EE368AC","alt":"CIS SecureSuite","width":"540","height":"360"}},"description":{"value":""},"legacyID":{"value":15739},"name":{"value":"CIS SecureSuite"},"slug":{"value":"cis-securesuite"}}}],"tags":[],"technologies":[],"controls":[],"postID":{"value":126},"resourceSubtitle":{"value":""},"resourceTitle":{"value":""},"cta":{"value":{"href":""}},"dateIssued":{"value":"0001-01-01T00:00:00Z"},"publishedAt":{"value":"2017-04-27T11:33:32Z"},"resourceContent":{"value":""},"resourceExcerpt":{"value":"\u003Cp\u003E24\u002F7 Security Operation Center Incident Response Services Cybersecurity Advisories and Notifications Access to Secure Portals for Communication and Document Sharing Cyber Alert Map Malicious Code Analysis Platform (MCAP) Weekly Top Malicious Domains\u002FIP Report Monthly Members-only Webcasts Access to Cybersecurity Table-top Exercises CIS Red Team (CRT) Nationwide Cyber Security Review (NCSR) Awareness and Education Materials\u003C\u002Fp\u003E"},"rightColumnContent":{"value":"\u003Cp\u003E\u003Cimg src=\"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2023\u002F01\u002Fms-isac--20th-anniversary--logo--large--600px.png?h=194&amp;w=350&amp;rev=5ac947a489a94f2a9af880a2331537ed&amp;hash=7B8AD697DAE12E708E112A9433AC8E85\" alt=\"MS-ISAC: Multi-State Information Sharing & Analysis Center\" style=\"width: 350px; height: 194px;\" \u002F\u003E\u003C\u002Fp\u003E\r\n\u003Ch3\u003EAlready a member?\u003C\u002Fh3\u003E\r\n\u003Cbr \u002F\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--secondary\" href=\"\u002Fms-isac\u002Fms-isac-charter\"\u003EView MS-ISAC Charter\u003C\u002Fa\u003E\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--secondary\" href=\"\u002Fms-isac\u002Fms-isac-charter\u002Fms-isac-executive-committee\"\u003EMeet our MS-ISAC Executive Committee\u003C\u002Fa\u003E\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--secondary\" href=\"\u002Fms-isac\u002Fservices\"\u003Evisit MS-ISAC Services\u003C\u002Fa\u003E\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--secondary\" href=\"\u002Fisac\u002Freport-an-incident\"\u003EReport a cybersecurity Incident\u003C\u002Fa\u003E\u003C\u002Fp\u003E\r\n\u003Ch3\u003ETackling Audits and Cloud Security Efficiently and at Scale\u003C\u002Fh3\u003E\r\n\u003Ca class=\"c-cta--secondary\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002FCIS_SecureSuite-Case_Study-State_of_Minn\"\u003EView Case Study\u003C\u002Fa\u003E\r\n\u003Ch3\u003ECybersecurity threats updates and more\u003C\u002Fh3\u003E\r\n\u003Cp\u003EGet timely updates by CIS and  MS-ISAC cybersecurity experts on current online security threats and more.\u003C\u002Fp\u003E\r\n\u003Cp\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Fcybersecurity-threats\"\u003ECybersecurity Threats Updates\u003C\u002Fa\u003E\r\n\u003Cbr \u002F\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Flog4j-zero-day-vulnerability-response\"\u003ESee all important Updates\u003C\u002Fa\u003E\r\n\u003C\u002Fp\u003E\r\n\u003Ch3\u003EWe value your questions and feedback\u003C\u002Fh3\u003E\r\n\u003Cp\u003EAt CIS, we are committed to serving the greater IT security community.\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--tertiary\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us\"\u003EContact Us Today\u003C\u002Fa\u003E\u003C\u002Fp\u003E"},"Page Design":null,"articleModifiedTime":{"value":"2021-11-22T16:23:00Z"},"articlePublishedTime":{"value":"0001-01-01T00:00:00Z"},"articlePublisher":{"value":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F"},"facebookDescription":{"value":"The MS-ISAC® is the focal point for cyber threat prevention, protection, response and recovery for U.S. State, Local, Territorial, and Tribal (SLTT) governments."},"facebookImage":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2018\u002F10\u002F4.png?h=627&iar=0&w=1200&rev=49a0fee5eb964f41b1d0b518570b3c73&hash=3B87FBC7260A6CBC60C065CCAB924653","alt":"MS-ISAC","width":"1200","height":"627"}},"facebookLocale":{"value":"en_US"},"facebookSiteName":{"value":"CIS"},"facebookTitle":{"value":"Multi-State Information Sharing and Analysis Center"},"facebookType":{"value":"article"},"facebookUrl":{"value":"https:\u002F\u002Fwww.cisecurity.org\u002Fms-isac\u002F"},"twitterCard":{"value":"summary_large_image"},"twitterDescription":{"value":""},"twitterImage":{"value":{}},"twitterReadTime":{"value":""},"twitterTitle":{"value":"MS-ISAC"},"twitterWrittenBy":{"value":""},"structuredDataDescription":{"value":""},"structuredDataImage":{"value":{}},"structuredDataTitle":{"value":""},"organization":{"id":"040fb806-1ddf-578d-a46e-f0cbe5f6ae39","url":"\u002Fcontent\u002Forganizations\u002Fcis-organization","name":"CIS-Organization","displayName":"CIS Organization","fields":{"contactPoints":[{"id":"35646787-128a-55cc-8c9e-e9f7ee9dcd01","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-customer-service","name":"CIS-Contact-Point-Customer-Service","displayName":"CIS Contact Point - Customer Service","fields":{"email":{"value":""},"telephone":{"value":"518-266-3460"},"contactType":{"value":"customer service"}}},{"id":"30467c35-2c29-593d-b5fa-8bd493dcf7d1","url":"https:\u002F\u002Fwww.cisecurity.org\u002Fcontent\u002Forganizations\u002Fcontactpoints\u002Fcis-contact-point-cybersecurity-incident","name":"CIS-Contact-Point-Cybersecurity-Incident","displayName":"CIS Contact Point - Cybersecurity Incident","fields":{"email":{"value":"soc@cisecurity.org"},"telephone":{"value":"866-787-4722"},"contactType":{"value":"cybersecurity incident"}}}],"postalAddress":{"id":"c10c91d4-27e5-52a9-bc77-9f8b773cbd11","url":"\u002Fcontent\u002Forganizations\u002Fpostaladdress\u002Fcis-postaladdress","name":"CIS-PostalAddress","displayName":"CIS Postal Address","fields":{"postalCode":{"value":"12061"},"country":{"value":"US"},"locality":{"value":"East Greenbush"},"region":{"value":"NY"},"street":{"value":"31 Tech Valley Drive"}}},"name":{"value":"Center for Internet Security"},"relatedUrls":{"value":"https:\u002F\u002Fen.wikipedia.org\u002Fwiki\u002FCenter_for_Internet_Security\r\nhttps:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F\r\nhttps:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F\r\nhttps:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F\r\nhttps:\u002F\u002Ftwitter.com\u002FCISecurity\u002F\r\n"},"telephone":{"value":"518-266-3460"},"url":{"value":"https:\u002F\u002Fwww.cisecurity.org"},"description":{"value":"The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place\r\nfor people, businesses, and governments through our core competencies of collaboration\r\nand innovation.\r\n"},"logo":{"value":{}}}}},"databaseName":"web","deviceId":"fe5d7fdf-89c0-4d99-9aa3-b5fbd009c9f3","itemId":"d08deda9-3029-4145-7ddb-b71f23291ce5","itemLanguage":"en","itemVersion":35,"layoutId":"c7698a3d-4d25-44d2-8d47-e0c96d6e424f","templateId":"963b37f6-e98d-55ac-9bbc-f8b1d5aa6167","templateName":"CIS-Resource-GenericPage-RouteType","placeholders":{"jss-banner":[{"uid":"e557a64c-79ff-4adc-a8c1-6cfd6b9323df","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{04FBF6E2-C039-4F1C-8C1B-B41CABA5CECA}","ph":"jss-banner","sig":"sxa-banner"},"placeholders":{"sxa-banner":[{"uid":"3c74800e-e981-47df-b975-64e0d73e46ca","componentName":"CIS-Banner","dataSource":"{E43A5261-F26B-4FBA-B0EB-4607E56770C8}","fields":{"content":{"value":"\u003Cp\u003EMake your cyber defense reasonable | \u003Ca href=\"\u002Fcis-securesuite\"\u003ESave up to 20% on CIS SecureSuite\u003C\u002Fa\u003E\u003C\u002Fp\u003E"}}}]}}],"jss-header":[{"uid":"2711a444-78ad-4ee2-bb35-7a13e1fdb360","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{16968506-A352-48E5-AA44-4E6A4EA4CA96}","ph":"jss-header","sig":"sxa-header"},"placeholders":{"sxa-header":[{"uid":"328909f8-cbeb-44ef-a4fc-134ea9f6c4f9","componentName":"CIS-Header","dataSource":"{450033B1-BCBB-43F2-87ED-F2E8D2EF6614}","fields":{"logo":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Fcis-logo.png?h=86&iar=0&w=300&rev=7ed3ffb78afd465c969c97d743c66d1c&hash=A51D01D4D383E4ACD170D4227BA4606B","alt":"CIS Logo","width":"300","height":"86"}},"logoLink":{"value":{"href":"\u002F","text":"Logo","linktype":"external","url":"\u002F","anchor":"","target":""}},"logoMobile":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2022\u002Flogo-mobile.svg?h=60&iar=0&w=155&rev=982608d429ea404fa13f0f7d84594a46&hash=2BAFE86C729F1EC4BC759D586ECC0D49","alt":"CIS Logo","width":"155","height":"60"}}},"placeholders":{"jss-global-links":[{"uid":"2126b36f-d96b-4d5c-842c-11541ddbf375","componentName":"CIS-HeaderUtility-Link","dataSource":"{73B049AB-6C79-4CEF-8FCE-853BD50E6146}","fields":{"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"c-header-utility__security","title":"","target":"","querystring":"","id":"{17A384ED-7A9D-E228-BE2B-EC5EC762A3F3}","href":"\u002Fcis-hardened-image-list"}}}},{"uid":"b90923e9-4fc7-419e-b99d-e6e3bde67cb7","componentName":"CIS-HeaderUtility-Link","dataSource":"{A3D61712-E370-4901-B7C9-4CE5F08BE2A3}","fields":{"link":{"value":{"linktype":"internal","text":"Support","class":"c-header-utility__support","querystring":"","target":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"c78f0976-de6c-4dc5-81a7-679fd494eb1e","componentName":"CIS-HeaderUtility-Link","dataSource":"{C6AF05B5-D306-4FCB-A358-D9A14F1EEEC5}","fields":{"link":{"value":{"href":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","linktype":"external","text":"CIS WorkBench Sign In","class":"c-header-utility__signin","url":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}}],"jss-nav":[{"uid":"ed5cf878-93f0-470f-b35f-26445268d7bf","componentName":"CIS-Navigation-Link","dataSource":"{8A1E2376-A4AB-4437-879F-BBAF836A69CB}","fields":{"content":{"value":""},"fullWidth":{"value":false},"link":{"value":{"text":"Company","anchor":"\u002F","linktype":"internal","class":"","title":"","querystring":"","id":"{6E72CC69-C129-4C6A-B439-296957F13A11}","href":"\u002F"}},"title":{"value":"Company"}},"placeholders":{"jss-dropdown":[{"uid":"36f636cb-409a-48f5-968e-755e3b7d9b76","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{8AAD819E-E56E-459F-9523-0A0A4AFFE503}","fields":{"content":{"value":"CIS is an independent, nonprofit organization with a mission to create confidence in the connected world."},"heading":{"value":"Who We Are"}},"placeholders":{"jss-link":[{"uid":"cb1739f1-5b33-425a-83c7-6baaae630912","componentName":"CIS-List-Link","dataSource":"{3A4B3C38-FAB2-4B8D-BB4C-E0105B310100}","fields":{"description":{"value":""},"link":{"value":{"text":"About Us","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}}}},{"uid":"0ebaac49-8f14-4235-99a2-bd808684dc78","componentName":"CIS-List-Link","dataSource":"{7E0B5AEC-66A1-4A71-B5E3-C61F123650D5}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Principles","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{819935F0-5143-D949-EFE4-8FE50A244B11}","href":"\u002Fabout-us\u002Fcis-leadership-principles"}}}},{"uid":"bee24314-44d4-4ff4-8c5f-2e542cf0ffb6","componentName":"CIS-List-Link","dataSource":"{E413B8F2-7527-47F1-AF16-72EDDCC6BBAF}","fields":{"description":{"value":""},"link":{"value":{"text":"Leadership Team","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"5d62de7e-9cfd-412a-a09c-988c835c9c2f","componentName":"CIS-List-Link","dataSource":"{D0576333-B539-4B02-8C3A-AD80884C6879}","fields":{"description":{"value":""},"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}}],"jss-link-second":[{"uid":"87e688ef-b608-4f61-9903-f7f7d5a328bc","componentName":"CIS-List-Link","dataSource":"{C7D0A084-4227-4B5D-B13A-8913C1AF2F24}","fields":{"description":{"value":""},"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"354aab95-9bc5-42c5-b955-c9f2a3e89874","componentName":"CIS-List-Link","dataSource":"{91CF1D26-7AB6-49A3-A6C3-2CC23F90F277}","fields":{"description":{"value":""},"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"f3013010-169d-4a55-97d6-318429307a14","componentName":"CIS-List-Link","dataSource":"{33CC2B08-F08F-4D16-BD74-82D8D15C6DBA}","fields":{"description":{"value":""},"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact Us","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}],"jss-link-bottom":[]}}]}},{"uid":"a85daf89-b69b-4cbf-870e-16091f7dd676","componentName":"CIS-Navigation-Link","dataSource":"{3CF4048D-5468-4562-9D53-5548E34BCF35}","fields":{"content":{"value":""},"fullWidth":{"value":true},"link":{"value":{"href":"\u002F","text":"Solutions","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Solutions"}},"placeholders":{"jss-dropdown":[{"uid":"c70af5ed-ac69-4708-938f-6b05f68e8b68","componentName":"CIS-DropDown-TwoColumn","dataSource":"{9D537D46-D706-45B3-B3B9-6FB2ACBCEF3C}","fields":{"linkRightBottom":{"value":{"text":"View All Products & Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}}},"placeholders":{"jss-column-left":[{"uid":"9a33d4bc-cf85-4bfc-ae58-68e08b995328","componentName":"CIS-DropDown-LinkSection","dataSource":"{9A662824-EA3A-4396-ACBF-32E1DB1EA03F}","fields":{"heading":{"value":"Secure Your Organization"},"icon":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-organization.svg?h=40&iar=0&w=31&rev=3ac90ee26d3e44cb9933bfb4fe833319&hash=F0300BD206B3EAE393C39355F9A7736B","alt":"Icon","width":"31","height":"40"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"0da76734-47f8-491f-b59a-cccc6ab8102f","componentName":"CIS-List-Link","dataSource":"{E93D3215-333B-46AD-8BB3-B2B53EF53C3F}","fields":{"description":{"value":"Prioritized & simplified best practices"},"link":{"value":{"text":"CIS Critical Security Controls®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"c1165c5c-73fc-4a73-9c15-5b9d2eb0cb6a","componentName":"CIS-List-Link","dataSource":"{AA55B710-CE50-4703-B678-84703152D96B}","fields":{"description":{"value":"Help develop and maintain the Controls"},"link":{"value":{"text":"CIS Controls Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F14FD165-50F4-70A7-D717-B58EFF6B22F5}","href":"\u002Fcommunities\u002Fcontrols"}}}},{"uid":"eec305d5-f4de-4a05-93e1-002dc952fbf5","componentName":"CIS-List-Link","dataSource":"{295443A1-E804-4B38-BF30-A5D4A7BF97B3}","fields":{"description":{"value":"Information security risk assessment method"},"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"f2ea3e6e-905b-49a2-8bd9-cc0a704174c1","componentName":"CIS-List-Link","dataSource":"{2DE5F28D-4B75-427A-8F52-C40FB56E4175}","fields":{"description":{"value":"Assess & measure Controls implementation"},"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}}]}},{"uid":"b9c8b9bc-4547-4815-a72c-558cc28152ea","componentName":"CIS-DropDown-LinkSection","dataSource":"{E4C08ADE-58B0-452E-A8C4-18F18F1BD8B6}","fields":{"heading":{"value":"Secure Specific Platforms"},"icon":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-platform.svg?h=35&iar=0&w=40&rev=02136d0686ec492789175c18a4b66c5a&hash=E2862B0C873D466C67AF6F3C745F8223","alt":"Icon","width":"40","height":"35"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"c1f0bb39-67cc-4be6-8eec-116856b737d3","componentName":"CIS-List-Link","dataSource":"{285291D8-B30A-4892-9118-4DF4AF15A8A8}","fields":{"description":{"value":"100+ vendor-neutral configuration guides"},"link":{"value":{"text":"CIS Benchmarks™","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"e53784f0-487c-4165-9580-cf3483b282e4","componentName":"CIS-List-Link","dataSource":"{FEA7DF03-9545-4D2E-8AD6-7BA46725D7F9}","fields":{"description":{"value":"Develop & update secure configuration guides"},"link":{"value":{"text":"CIS Benchmarks Community","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E2E60C34-788C-3C5E-B4AB-D9B8D9AEF16D}","href":"\u002Fcommunities\u002Fbenchmarks"}}}},{"uid":"b5f73c72-b943-4992-b71f-2802011e3b51","componentName":"CIS-List-Link","dataSource":"{D4B85B15-8FFD-4423-95FF-AFD5D0AA16AF}","fields":{"description":{"value":"Assess system conformance to CIS Benchmarks"},"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"add2f3f9-ca40-4b9a-b8ab-7fb1edf62543","componentName":"CIS-List-Link","dataSource":"{8A97B104-711B-4243-83F4-C1EDAECEB17D}","fields":{"description":{"value":"Virtual images hardened to CIS Benchmarks on cloud service provider marketplaces"},"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}}]}},{"uid":"705a1ccd-9559-4b1e-bc85-7821f24cba41","componentName":"CIS-DropDown-LinkSection","dataSource":"{1F533DE6-7FDD-463F-A560-8EDBBBFAD8E2}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"heading":{"value":"Secure Your Situation"},"icon":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Ficon-situation.svg?h=39&iar=0&w=40&rev=31c65e64a468409fa01c91555a6f1722&hash=155E5BA7463CE12876E73DA3E417E247","alt":"Situation","width":"40","height":"39"}},"listFullWidth":{"value":false}},"placeholders":{"jss-link":[{"uid":"a0f636c3-cd4f-4fea-b6cb-52b176d6d239","componentName":"CIS-List-Link","dataSource":"{D4DBA30D-3A50-482C-8AA3-85B4C2B30B83}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":"Your industry's specific threats and needs"},"link":{"value":{"text":"Industries","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C8E4AB9D-99F0-463C-8F20-FF8ABA96FB2E}","href":"\u002Findustry"}}}},{"uid":"d3e205e5-29f0-4a78-8646-731a411b0d7f","componentName":"CIS-List-Link","dataSource":"{67046EBF-2368-46AA-B497-7B382BF8A3DE}","params":{"GridParameters":"col-12","CacheClearingBehavior":"Clear on publish"},"fields":{"description":{"value":"Dive deeper into specific cybersecurity topics"},"link":{"value":{"text":"Topics","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{9B71A3D1-6EE5-4B7F-8E6F-11172EDC0E70}","href":"\u002Ftopics"}}}}]}},{"uid":"84de6200-b476-4277-a087-a076ea002b28","componentName":"CIS-DropDown-LinkSection-Bordered","dataSource":"{7FE5ACDA-99FC-490D-9969-D6B1C2625D0F}","fields":{"heading":{"value":""},"icon":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-securesuite.svg?h=41&iar=0&w=41&rev=c067c575dc7e48fa83e5a052d7029702&hash=2F2655A91C693BD1463FD39D63A1349D","alt":"SecureSuite®","width":"41","height":"41"}},"listFullWidth":{"value":true}},"placeholders":{"jss-link":[{"uid":"54bda5c1-72f4-41f3-9aa4-2e59b3daf380","componentName":"CIS-List-Link-Extra-Links","dataSource":"{B714D7A2-3ED3-45C5-8109-C2201314CB64}","fields":{"description":{"value":"Start secure and stay secure with integrated cybersecurity tools and resources designed to help you implement CIS Benchmarks and CIS Controls"},"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomOne":{"value":{"text":"Learn More","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}},"linkBottomTwo":{"value":{"href":"https:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","text":"Apply Now","linktype":"external","url":"https:\u002F\u002Fenroll.cisecurity.org\u002Fmemberships\u002F#\u002F","anchor":"","target":""}}}}]}}],"jss-column-right":[{"uid":"cfb2ba39-ed8d-49f6-8f21-7ef64cbfdf3c","componentName":"CIS-DropDown-LinkSectionWithBg","dataSource":"{D72FAEFA-3AE5-4624-86B1-30557751C0F5}","fields":{"heading":{"value":"U.S. State, Local, Tribal & Territorial Governments"},"headingLeft":{"value":"Memberships"},"headingLeft_2":{"value":""},"headingRight":{"value":"Services for Members"},"icon":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Ficon-government.svg?h=41&iar=0&w=41&rev=16678d2dab0b478e97bd953706f9e35e&hash=C18C652B4AC22AE85971DAFF9DD38A68","alt":"U.S. State, Local, Tribal & Territorial Governments","width":"41","height":"41"}},"link":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}},"linkBg":{"value":{"text":"View All CIS Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}},"placeholders":{"jss-bg-left":[{"uid":"9936591d-cb1c-4e0f-ae0b-2efc99a50262","componentName":"CIS-List-Link-Title","dataSource":"{4A882BCE-E4A5-450B-AC2A-611708B9EBDA}","fields":{"heading":{"value":"Memberships"}}},{"uid":"01997673-069c-40b2-82da-97a50a39a88a","componentName":"CIS-List-Link","dataSource":"{74D9205C-915C-45C2-82DC-F72E255FFFA3}","fields":{"description":{"value":"Cybersecurity resource for SLTT Governments"},"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"2bd7b657-50e3-4975-8266-7993bdef3152","componentName":"CIS-List-Link","dataSource":"{A2F2C1C2-E2BC-423A-B7A8-DEC12746ACC5}","fields":{"description":{"value":"Election-focused cyber defense suite"},"link":{"value":{"text":"EI-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"e8e546d1-fd1c-46be-9539-1d7b65e162b9","componentName":"CIS-List-Link-Title","dataSource":"{E20A50CE-5E81-4B56-8901-1F90571CACE3}","fields":{"heading":{"value":"Elections"}}},{"uid":"0920dc46-9497-4240-bc87-3c2f5dc3ca91","componentName":"CIS-List-Link","dataSource":"{4BC43D06-F4DA-4E88-901E-258B20EE2354}","fields":{"description":{"value":"Sources to support the cybersecurity needs of the election community"},"link":{"value":{"text":"Election Security Tools And Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}}],"jss-bg-right":[{"uid":"0628201d-8988-4d62-b289-260aa03f1087","componentName":"CIS-List-Link-Title","dataSource":"{7BB43C52-ED1E-478E-B0DE-3F7325B225E4}","fields":{"heading":{"value":"Services for Members"}}},{"uid":"ee5eeb3f-075b-40e2-80a4-1c3cf08bf273","componentName":"CIS-List-Link","dataSource":"{FA210D02-EA30-45CE-81ED-572882AE5F93}","fields":{"description":{"value":"Cost-effective Intrusion Detection System"},"link":{"value":{"text":"Albert Network Monitoring®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"70bed5cf-edf6-40eb-8d13-c04a6302d178","componentName":"CIS-List-Link","dataSource":"{BA57CC9E-8D21-4A2C-B833-4980B4A32FDE}","fields":{"description":{"value":"Security monitoring of enterprises devices"},"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"03dee259-e087-4707-b107-0baacde1d5d4","componentName":"CIS-List-Link","dataSource":"{3CFFA584-409D-4428-A43E-09E37A7B3D9B}","fields":{"description":{"value":"Device-level protection and response"},"link":{"value":{"text":"CIS Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"77e9bbb8-d5c4-4873-98b2-f65be8d5fcdd","componentName":"CIS-List-Link","dataSource":"{ED9D5296-EE40-4CAF-9195-8FCE68333DFA}","fields":{"description":{"value":"Savings on training and software"},"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}},{"uid":"fae63fa0-0e46-4d65-bb7d-5ba38d200cb1","componentName":"CIS-List-Link","dataSource":"{1465AC7B-EDF6-4F98-8840-BCCE1E5C9D95}","fields":{"description":{"value":"Prevent connection to harmful web domains"},"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}}]}}]}}]}},{"uid":"7cc9bb04-9f20-42f1-b974-cde5b2c6094d","componentName":"CIS-Navigation-Link","dataSource":"{3D87CDC1-5AE3-4B1F-B95C-6AE07F6EBF71}","fields":{"content":{"value":""},"fullWidth":{"value":true},"link":{"value":{"text":"Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","href":"\u002Finsights"}},"title":{"value":"Insights"}},"placeholders":{"jss-dropdown":[{"uid":"e4a27e4e-9031-4bfe-8bde-7a4123f2efe8","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{7E6BF5B0-FD02-404C-BA0E-FEAD337CB9EC}","fields":{"content":{"value":"Explore trending articles, expert perspectives, real-world applications, and more from the best minds in cybersecurity and IT."},"heading":{"value":"Insights"}},"placeholders":{"jss-link":[{"uid":"a88bb037-4188-4743-aeff-571c3f7ddfed","componentName":"CIS-List-Link","dataSource":"{28C31E26-1C34-4DCA-B662-C1C3064C860B}","fields":{"description":{"value":""},"link":{"value":{"text":"Advisories","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{977EDD7F-F11F-5770-ADD2-C7E2CA47B471}","href":"\u002Fadvisory"}}}},{"uid":"7afae56c-6aa3-4808-9323-24b3efdd4587","componentName":"CIS-List-Link","dataSource":"{F203FE56-AC25-409E-8E47-E2C7193CDAA9}","fields":{"description":{"value":""},"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"362d9a7f-c77e-481a-ab84-b4e71d2b77cd","componentName":"CIS-List-Link","dataSource":"{55CDE8FF-0116-482A-9D5A-0D6A4F396BAC}","fields":{"description":{"value":""},"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"46693bbb-2607-4400-817a-669114598530","componentName":"CIS-List-Link","dataSource":"{2E11D16A-402E-4C9F-9AA3-6D0E66CB1B9C}","fields":{"description":{"value":""},"link":{"value":{"id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","querystring":"","text":"Spotlights","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fspotlight","linktype":"internal","href":"\u002Finsights\u002Fspotlight"}}}}],"jss-link-second":[{"uid":"9632edf6-b084-42cf-b688-8feef21a06ed","componentName":"CIS-List-Link","dataSource":"{AF8DEABD-3EA5-4442-AFE4-2B7453F03C7F}","fields":{"description":{"value":""},"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"a0ea545f-7d6d-43f4-891e-bfbdae1a3823","componentName":"CIS-List-Link","dataSource":"{DE522F3E-4549-4E11-AC31-389B394BDB59}","fields":{"description":{"value":""},"link":{"value":{"text":"Podcasts","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{02EAD54A-71B4-5BE2-9E78-83925450A1B3}","href":"\u002Finsights\u002Fpodcast"}}}},{"uid":"893e2d06-8485-4226-9c68-be0baf841f8d","componentName":"CIS-List-Link","dataSource":"{B828F752-13CE-4AE1-AA69-4BA39E9D9276}","fields":{"description":{"value":""},"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"704694f4-71e5-49a1-9448-82845348f643","componentName":"CIS-List-Link","dataSource":"{B7368F49-B590-45C3-992C-84974D94DC4D}","fields":{"description":{"value":""},"link":{"value":{"text":"Whitepapers","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C74111A6-95B5-5A9E-A5DF-2E2A7D2884F9}","href":"\u002Finsights\u002Fwhite-papers"}}}}],"jss-link-bottom":[{"uid":"c7360426-3aaf-47f8-a97c-69c17bcbe335","componentName":"CIS-CTA-Secondary","dataSource":"{1DDC74DF-F8F7-4054-AA7A-AC7197A4F113}","fields":{"cta":{"value":{"text":"View All Insights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AA1576EB-41D5-5908-8670-7482A60EF2FE}","href":"\u002Finsights\u002Fall"}}}}]}}]}},{"uid":"210d76b3-a08a-4575-9c45-f573ce6634dc","componentName":"CIS-Navigation-Link","dataSource":"{709FA9B7-B6BB-43E9-8338-2292C3A1F8DE}","fields":{"content":{"value":""},"fullWidth":{"value":false},"link":{"value":{"href":"\u002F","text":"Join CIS","linktype":"external","url":"\u002F","anchor":"","target":""}},"title":{"value":"Join CIS"}},"placeholders":{"jss-dropdown":[{"uid":"9e7ad4da-90d4-4b39-b24b-06754d51dcb6","componentName":"CIS-DropDown-ContentWithLinks","dataSource":"{2D08E60E-967F-4BC0-96EA-E81EB0647361}","fields":{"content":{"value":"Join us on our mission to secure online experiences for all. Become a CIS member, partner, or volunteer—and explore our career opportunities."},"heading":{"value":"Get Involved"}},"placeholders":{"jss-link":[{"uid":"3997df11-bd24-421a-898c-56364f1c2c07","componentName":"CIS-List-Link","dataSource":"{6B8F8747-7ED6-4238-83C9-D05FE3636413}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS SecureSuite® Membership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"643776ab-eefe-46f1-9128-7b918f0ca3a6","componentName":"CIS-List-Link","dataSource":"{F06A46E0-940D-48A3-868A-9DC46B6705EC}","fields":{"description":{"value":""},"link":{"value":{"text":"Multi-State ISAC (MS-ISAC®)","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"d85631ff-9cf4-485e-afd3-de47bf00b2f6","componentName":"CIS-List-Link","dataSource":"{5926B4E2-A03F-4F82-80FE-3B280C220391}","fields":{"description":{"value":""},"link":{"value":{"text":"Elections Infrastructure ISAC (EI-ISAC®)","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"1a086d84-0685-4edd-88c7-ec1914466913","componentName":"CIS-List-Link","dataSource":"{2B1A6AD2-4554-41EE-AB08-EEA7E555BCC7}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS CyberMarket® Vendors","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{F4EA8918-FC81-DFEB-4F6C-95111021DD73}","href":"\u002Fservices\u002Fcis-cybermarket\u002Fvendor-information"}}}},{"uid":"367d33a8-9fdf-4368-8bf6-42ec6fa87b60","componentName":"CIS-List-Link","dataSource":"{3BDE9CF1-7D21-4B68-AAD4-8410098D4E9F}","fields":{"description":{"value":""},"link":{"value":{"text":"CIS Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"ae84ead0-c256-4bf0-85ed-d2515a58d091","componentName":"CIS-List-Link","dataSource":"{72A11957-58AD-43F6-A3F2-4A061683EC8D}","fields":{"description":{"value":""},"link":{"value":{"href":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","text":"Careers","linktype":"external","url":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002Fjobs\u002Fsearch?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240","anchor":"","target":""}}}}],"jss-link-second":[],"jss-link-bottom":[]}}]}}],"jss-alert":[{"uid":"be66fe6c-f368-42d0-a2a3-626fc41b05c0","componentName":"CIS-Alert","dataSource":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FPresentation\u002FPartial Designs\u002FHeader\u002FData\u002FAlert","fields":{"alert":{"id":"a2b3d6ff-dd6a-411a-b3d9-bbcd6ef49a9c","url":"\u002Fcontent\u002Falertlevel\u002Falert_level","name":"alert_level","displayName":"Alert Level","fields":{"alertLevelDescription":{"value":"On September 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Apple and Google products. On September 16, the MS-ISAC released an advisory for multiple vulnerabilities in Apple products, the most severe of which could allow for arbitrary code execution. On September 17, the MS-ISAC released an advisory for multiple vulnerabilities in Google products, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources."},"color":{"value":"BLUE"},"dateIssued":{"value":"2024-09-18T04:00:00Z"},"legacyId":{"value":347},"publishedAt":{"value":"2024-09-18T15:36:34Z"},"threatLevel":{"value":"GUARDED"}}}}}]}}]}}],"jss-breadcrumb":[{"uid":"11caf8ac-1f6e-4faa-8d01-8b5100048c2c","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{3E297728-248B-46F3-A64F-8A7DFF331DEA}","ph":"jss-breadcrumb","sig":"sxa-breadcrumb"},"placeholders":{"sxa-breadcrumb":[{"uid":"38fd4f7f-b25a-4747-8f56-434991c6c931","componentName":"CIS-Breadcrumb","dataSource":""}]}}],"jss-main":[{"uid":"963bd30b-21f3-4aca-8163-97c9f23dc87f","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{FF00E04B-E50A-4732-8D51-DD61BB8AA096}","ph":"jss-main","sig":"sxa-generic-page"},"placeholders":{"sxa-generic-page":[{"uid":"b761183f-8381-4a50-a2ab-2e91886bdc3c","componentName":"CIS-Resource-GenericPage","dataSource":"","placeholders":{"jss-top-content":[{"uid":"46b96d8f-a3e6-4268-84c4-c23a111cc56b","componentName":"CIS-Masthead","dataSource":"{9CF6CF07-EE61-48B4-973E-8EEEB7E2661D}","fields":{"center":{"value":false},"cta1":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fms-isac-registration","text":"Join the MS-ISAC","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fms-isac-registration","anchor":"","target":""}},"cta2":{"value":{"href":""}},"heading":{"value":"Multi-State Information Sharing and Analysis Center®"},"image":{"value":{}},"lead":{"value":""},"padding":{"value":false},"subheading":{"value":"The mission of the MS-ISAC® is to improve the overall cybersecurity posture of U.S. State, Local, Tribal, and Territorial (SLTT) government organizations through coordination, collaboration, cooperation, and increased communication."},"subsubheading":{"value":""}}},{"uid":"2bbf4b86-1ab4-4219-838a-99a2e6ed23dc","componentName":"CIS-Alert-Secondary","dataSource":"{EBA1C236-D2E3-4D07-B202-157043A1C979}","fields":{"alert":{"id":"a2b3d6ff-dd6a-411a-b3d9-bbcd6ef49a9c","url":"\u002Fcontent\u002Falertlevel\u002Falert_level","name":"alert_level","displayName":"Alert Level","fields":{"alertLevelDescription":{"value":"On September 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Apple and Google products. On September 16, the MS-ISAC released an advisory for multiple vulnerabilities in Apple products, the most severe of which could allow for arbitrary code execution. On September 17, the MS-ISAC released an advisory for multiple vulnerabilities in Google products, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources."},"color":{"value":"BLUE"},"dateIssued":{"value":"2024-09-18T04:00:00Z"},"legacyId":{"value":347},"publishedAt":{"value":"2024-09-18T15:36:34Z"},"threatLevel":{"value":"GUARDED"}}},"description":{"value":"Learn what are the alert levels and how they can serve your organization"},"link":{"value":{"text":"About this threat","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{3E652814-EAC4-A223-43ED-8C570FEFC678}","href":"\u002Fcybersecurity-threats\u002Falert-level"}},"modalContent":{"value":"\u003Ch3\u003EAlert Levels\u003C\u002Fh3\u003E\r\n\u003Cp\u003EThe alert level is determined using a threat severity formula: Severity = (Criticality + Lethality) &ndash; (System Countermeasures + Network Countermeasures)\u003C\u002Fp\u003E\r\n\u003Cdiv class=\"modal-levels\"\u003E\r\n\u003Cdiv class=\"level-description\"\u003E\r\n\u003Cdiv class=\"level green\"\u003ELow\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"desc\"\u003EAt this level, no unusual activity exists beyond the normal concern for known hacking activities, known viruses, or other malicious activity.\u003C\u002Fdiv\u003E\r\n\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"level-description\"\u003E\r\n\u003Cdiv class=\"level blue\"\u003EGuarded\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"desc\"\u003EAt this level, the potential for malicious cyber activities exists, but no known exploits have been identified, or known exploits have been identified but no significant impact has occurred.\u003C\u002Fdiv\u003E\r\n\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"level-description\"\u003E\r\n\u003Cdiv class=\"level yellow\"\u003EElevated\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"desc\"\u003EAt this level, there are known vulnerabilities that are being exploited with a moderate level of damage or disruption, or the potential for significant damage or disruption is high.\u003C\u002Fdiv\u003E\r\n\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"level-description\"\u003E\r\n\u003Cdiv class=\"level orange\"\u003EHigh\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"desc\"\u003EAt this level, vulnerabilities are being exploited with a high level of damage or disruption, or the potential for severe damage or disruption is high.\u003C\u002Fdiv\u003E\r\n\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"level-description\"\u003E\r\n\u003Cdiv class=\"level red\"\u003ESevere\u003C\u002Fdiv\u003E\r\n\u003Cdiv class=\"desc\"\u003EAt this level, vulnerabilities are being exploited with a severe level or widespread level of damage or disruption of Critical Infrastructure Assets.\u003C\u002Fdiv\u003E\r\n\u003C\u002Fdiv\u003E\r\n\u003Ca class=\"c-cta--secondary\" href=\"\u002Fcybersecurity-threats\u002Falert-level\"\u003ELearn more about the alert levels\u003C\u002Fa\u003E\r\n\u003C\u002Fdiv\u003E"}}}],"jss-top-left-content":[{"uid":"bf7ec96b-99c4-4db1-9384-f37400412752","componentName":"CIS-RichText","dataSource":"{81138196-DB08-48EE-AE13-13B134612B83}","fields":{"content":{"value":"\u003Cscript src=\"https:\u002F\u002Ffast.wistia.com\u002Fembed\u002Fmedias\u002Fq1f6qga5y0.jsonp\" async\u003E\u003C\u002Fscript\u003E\r\n\u003Cscript src=\"https:\u002F\u002Ffast.wistia.com\u002Fassets\u002Fexternal\u002FE-v1.js\" async\u003E\u003C\u002Fscript\u003E\r\n\u003Ch2\u003EMS-ISAC\u003Csup\u003E®\u003C\u002Fsup\u003E at a glance\u003C\u002Fh2\u003E\r\n\u003Cp\u003EAs a trusted cybersecurity partner for 17,000+ U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, we cultivate a collaborative environment for information sharing in support of our \u003Ca class=\"tooltip\" tooltip=\"&lt;p&gt;&lt;strong&gt;MS-ISAC Mission&lt;\u002Fstrong&gt;&lt;\u002Fp&gt;&lt;p&gt;The mission of the MS-ISAC is to improve the overall cybersecurity posture of the nation’s SLTTs governments through focused cyber threat prevention, protection, response, and recovery.&lt;\u002Fp&gt;\"\u003Emission\u003C\u002Fa\u003E. We offer members incident response and remediation support through our team of security experts and develop tactical, strategic, and operational intelligence, and advisories that offer actionable information for improving cyber maturity.\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Cspan class=\"wistia_embed wistia_async_q1f6qga5y0 popover=true popoverContent=link\" style=\"display: block; position: relative;\"\u003E\u003Ca class=\"c-cta--tertiary\"\u003EWatch video to learn more\u003C\u002Fa\u003E\u003C\u002Fspan\u003E\u003C\u002Fp\u003E\r\n\u003Ch3\u003EBenefits\u003C\u002Fh3\u003E\r\n\u003Cul\u003E\r\n    \u003Cli\u003E24x7x365 Security Operations Center (SOC) offering threat intelligence, detection, and response assistance\u003C\u002Fli\u003E\r\n    \u003Cli\u003ERegular webinars examining critical and timely cybersecurity issues\u003C\u002Fli\u003E\r\n    \u003Cli\u003EAccess to the Nationwide Cybersecurity Review (NCSR) to review your cybersecurity maturity\u003C\u002Fli\u003E\r\n    \u003Cli\u003ENo-cost cybersecurity tools and resources, including a CIS SecureSuite Membership\u003C\u002Fli\u003E\r\n    \u003Cli\u003ECybersecurity Advisories and Notifications\u003C\u002Fli\u003E\r\n    \u003Cli\u003EAccess to Secure Portals for Communication and Document Sharing\u003C\u002Fli\u003E\r\n    \u003Cli\u003ECyber Alert Map\u003C\u002Fli\u003E\r\n    \u003Cli\u003EWeekly Top Malicious Domains\u002FIP Report\u003C\u002Fli\u003E\r\n    \u003Cli\u003EMonthly Members-only Webcasts\u003C\u002Fli\u003E\r\n\u003C\u002Ful\u003E\r\n\u003Cbr \u002F\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--secondary\" href=\"\u002Fms-isac\u002Fservices\"\u003EExplore ms-isac Services\u003C\u002Fa\u003E\u003C\u002Fp\u003E"}}},{"uid":"808d7115-1186-4d4f-8b9a-79e2a06b9389","componentName":"CIS-Image-Carousel","dataSource":"{0F838023-819E-4F0F-A358-E8B90C4254F5}","fields":{"autoplay":{"value":true},"carouselSpeed":{"value":null},"content":{"value":"\u003Cscript src=\"https:\u002F\u002Ffast.wistia.com\u002Fembed\u002Fmedias\u002Frnvmw9538i.jsonp\" async\u003E\u003C\u002Fscript\u003E\r\n\u003Cscript src=\"https:\u002F\u002Ffast.wistia.com\u002Fassets\u002Fexternal\u002FE-v1.js\" async\u003E\u003C\u002Fscript\u003E\r\n\u003Cp\u003E\u003Cspan class=\"wistia_embed wistia_async_rnvmw9538i popover=true popoverContent=link\" style=\"display: block; position: relative;\"\u003E\u003Ca class=\"c-cta--tertiary\"\u003EWatch Testimonial Video\u003C\u002Fa\u003E\u003C\u002Fspan\u003E\u003C\u002Fp\u003E"},"heading":{"value":"Our Partners"},"leadCopy":{"value":""},"slidesToShowDestop":{"value":null},"slidesToShowMobile":{"value":null},"slidesToShowTablet":{"value":null}},"placeholders":{"jss-image-carousel":[{"uid":"ef998233-b038-4e1d-919c-f0602798e49b","componentName":"CIS-Image-Carousel-Item","dataSource":"{E6CE863D-4C8F-41FF-83FF-7E7B858F3327}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fus-department-of-homeland-security.png?h=232&iar=0&w=390&rev=7b716b68916f4f559464418157625cef&hash=C96A4A5F68BDF8B2017367EE521A060E","alt":"US Department of Homeland Security","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"68335290-a387-4746-8d4e-b75914bec32a","componentName":"CIS-Image-Carousel-Item","dataSource":"{EC860D49-7074-470D-BC05-00CA72E966FC}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fus-cert.png?h=232&iar=0&w=390&rev=807b67e46732451889c05590ab3eaf15&hash=A7EDCCE4FA9F30E8B4607464D17F36F3","alt":"US CERT","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"9a04a087-6549-453c-9c23-7ed3144a1e39","componentName":"CIS-Image-Carousel-Item","dataSource":"{3F4DB687-5608-4FD4-B478-E7423ECF035F}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fuploads\u002F2022\u002F07\u002Fstop-think-connect.png?h=232&iar=0&w=390&rev=59cd7a9c08fd44759226fb115e129d01&hash=2A543060620D68E8B1B3691B508F174A","alt":"Stop Think Connect","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"fbef73e8-3264-4f87-934f-6b90ead9c26d","componentName":"CIS-Image-Carousel-Item","dataSource":"{2134BC31-0800-4584-9532-5C01CD57343D}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnascio.png?h=232&iar=0&w=390&rev=b51afeb0967b4c78a9cfd883dc822b41&hash=03387FB48D9B2010270FA915EAFF6847","alt":"Nascio","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"88115016-a62d-4932-b595-3586d93cd57a","componentName":"CIS-Image-Carousel-Item","dataSource":"{4613036B-E3ED-4BBE-A22E-A572148493E0}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fglobal-cyber-alliance.png?h=232&iar=0&w=390&rev=1e9e0649c3344150bb59ea70ddd7400f&hash=2E72D5E873343004E6154F78CE876325","alt":"Global Cyber Alliance","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"865684ad-b144-49e4-a30e-e0d3475fc5a8","componentName":"CIS-Image-Carousel-Item","dataSource":"{F1A3B5CA-E7CF-469C-A4A2-2427C20B0CB5}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fwater-isac.png?h=232&iar=0&w=390&rev=6e4c3b2909ad4969975524e7d64c0af3&hash=CBE9583B8AD9E770A11C60F21556506B","alt":"Water ISAC","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"700ee03d-9ba4-4a1e-be1d-dc2a991ad648","componentName":"CIS-Image-Carousel-Item","dataSource":"{A7A51CA5-F77C-4D7F-BAC6-0A2A4F7C5F3F}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fcosn.png?h=232&iar=0&w=390&rev=a39944cddf2b4221932d58a04be1d153&hash=9967046F3200560B7E0F58EE46D12B7F","alt":"COSN","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"c8ac3be2-c9c4-4939-a1b3-dc3226b1e8af","componentName":"CIS-Image-Carousel-Item","dataSource":"{0A548012-AC6C-44EE-8D99-110C3A30C8BB}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnw3c.png?h=232&iar=0&w=390&rev=87310ab16fb440e18367a019ff249767&hash=77326E6B7E25FBE32825EEE4D1946A14","alt":"NW3C","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"3d8eabc5-9db3-451c-97bd-de522a9784c1","componentName":"CIS-Image-Carousel-Item","dataSource":"{55C80639-8F9E-42B6-BC4A-344A86C5292B}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fcybercrime.png?h=232&iar=0&w=390&rev=2a85d9ce04e24fc58538ea643f3d4c4c&hash=51B66B77A19C10D27F5286F1C97C9CDF","alt":"Cybercrime","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"5a418abc-50fd-4c50-8912-091a639d356e","componentName":"CIS-Image-Carousel-Item","dataSource":"{A6E817B8-D6BF-4156-96AF-1C2C437074DB}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fcyber-threat-alliance.png?h=232&iar=0&w=390&rev=ea8d895e450b4febab8c298650ebd376&hash=B6F5A504746A2834703430E2A85FB0D2","alt":"Cyber Threat Alliance","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"c08d16e0-51cc-43ab-b636-a19838c00bf9","componentName":"CIS-Image-Carousel-Item","dataSource":"{52DDA9AC-90A1-42E7-9E7F-902A9ABD5A99}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnfca.png?h=232&iar=0&w=390&rev=ee35e4483e914777b3b08e6d92788960&hash=C2B7949C84AD355F1DD23855F79FB0FD","alt":"NFCA","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"33009971-06f6-438d-bbbe-e880dc9ed52e","componentName":"CIS-Image-Carousel-Item","dataSource":"{AAFE0996-1391-4F02-A1C8-C8A7C4E58ACD}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnational-governors-association.png?h=232&iar=0&w=390&rev=e90c3eb6e8e54be8a75ed24f8780475a&hash=4A242AC4EC7CE8463109FC43B69D2BBA","alt":"National Governors Association","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"4d6a0982-a4cd-401f-afc3-e305ab7144dd","componentName":"CIS-Image-Carousel-Item","dataSource":"{1307EF9C-0D7D-4FA9-A333-B6C1F0DD1D04}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnational-council-isacs.png?h=232&iar=0&w=390&rev=18a7a43fb4e8421fb2f1cea53d569858&hash=6D1DA7F1BEB8A1FE5DA83C46508244C6","alt":"National Council Isacs","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"a4e9e1dc-8188-4646-8e2c-4d0a9a16b662","componentName":"CIS-Image-Carousel-Item","dataSource":"{81F78CC3-1ABA-45BF-9979-94C0A29DF720}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fpti.png?h=138&iar=0&w=326&rev=0b6e4c2ada5a4b65acf4185a06ceaab2&hash=61416C34F06A821086DE0D1866B6D228","alt":"PTI","width":"326","height":"138"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"da4921b9-854a-49bd-8a57-754dddf7bb23","componentName":"CIS-Image-Carousel-Item","dataSource":"{E8E1066C-B446-4CB0-8923-C12BEC8FA8CE}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fe-isac.png?h=232&iar=0&w=390&rev=f193a0cf93a645469d65c7df6aae7480&hash=97293C60A008DB8CF35ECC5D775A9CEF","alt":"E-ISAC","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"54798a49-1a90-4a22-8cca-456abc0c784d","componentName":"CIS-Image-Carousel-Item","dataSource":"{BF30DD9C-1DB9-47D0-A843-256A88E1473D}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fnaco.png?h=232&iar=0&w=390&rev=399abfdb40dd4e5184b1736f097c247c&hash=B9294985C58CFE4290C28EF44CBA0199","alt":"NACo","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"34d6ff67-1b7c-4d6d-a571-6a288cfdc5de","componentName":"CIS-Image-Carousel-Item","dataSource":"{D64F99E4-0F96-4E6C-B74E-499E14E914B7}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fglobal-resilience-federation.png?h=232&iar=0&w=390&rev=ec06d4fffeb940649f8053f9959d8338&hash=999A019A124038E21D51B583C335695F","alt":"Global Resilience Federation","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}},{"uid":"7534e85d-a7f6-4036-b340-b862293a0356","componentName":"CIS-Image-Carousel-Item","dataSource":"{6CEDE0FB-31B0-4751-9A78-41A29B89D638}","fields":{"center":{"value":true},"description":{"value":""},"headline":{"value":""},"image":{"value":{"src":"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Fpartners-logos\u002F2022\u002Fdng-isac.png?h=232&iar=0&w=390&rev=e3b409c82651433a8ac66e586e3dfc3d&hash=EFEF62A0FA6B9AA289DD06F37CDCBBCE","alt":"DNG-ISAC","width":"390","height":"232"}},"link":{"value":{"href":""}},"padding":{"value":false},"subheadline":{"value":""}}}]}},{"uid":"1690be76-e331-43d8-a1e9-59c195dac723","componentName":"CIS-Content-Blue-Box","dataSource":"{F2D25117-2E8D-4BFC-B6FC-FA0DA526457F}","fields":{"content":{"value":"\u003Ch3\u003ENot a member yet?\u003C\u002Fh3\u003E\r\n\u003Cp\u003EJoining is easy, the MS-ISAC Membership is available at no cost and is open to all U.S. SLTT government organizations.\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Ca class=\"c-cta--primary\" href=\"https:\u002F\u002Flearn.cisecurity.org\u002Fms-isac-registration\"\u003EJoin the MS-ISAC\u003C\u002Fa\u003E\u003C\u002Fp\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Fms-isac\u002Fms-isac-membership-faq\"\u003ESee Membership FAQs\u003C\u002Fa\u003E\r\n\u003C!-- \u003Ca class=\"c-cta--tertiary\" href=\"\u002Fsitecore\u002Fservice\u002Fnotfound.aspx?item=web%3a%7b3D5A649E-BED7-FF89-009A-868F86D85BE5%7d%40en\"\u003ESee members list\u003C\u002Fa\u003E --\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Fisac\u002Freport-an-incident\"\u003EHow To Report an Incident\u003C\u002Fa\u003E"},"icon":{"value":{}}}}],"jss-bottom-left-content":[{"uid":"b6e3456a-7691-4df3-a712-808dea713564","componentName":"CIS-RichText","dataSource":"{30B34AD3-3E96-4FA0-BF2A-C8FDBB2BB262}","fields":{"content":{"value":"\u003Ch2\u003ECIS is home to the MS-ISAC\u003C\u002Fh2\u003E\r\n\u003Cp\u003EAs an \u003Ca class=\"tooltip\" tooltip=\"&lt;p&gt;&lt;strong&gt;What’s an ISAC?&lt;\u002Fstrong&gt;&lt;\u002Fp&gt;&lt;p&gt;An Information Sharing and Analysis Center (ISAC) collects, analyzes, and disseminates actionable threat information to members and provides them with tools to mitigate risks and improve resiliency.&lt;\u002Fp&gt;\"\u003EISAC\u003C\u002Fa\u003E member, you'll get access to a community that will help you stay up to date on cyber threats facing your industry.\u003C\u002Fp\u003E\r\n\u003Cp\u003EThe MS-ISAC is federally funded by CISA and a division of the Center for Internet Security (CIS). The MS-ISAC is autonomously guided by its Executive Committee and member organizations.\u003C\u002Fp\u003E\r\n\u003Cp\u003ELearn how U.S. State, Local, Tribal, and Territorial (SLTT) entities can report a cybersecurity incident.\u003C\u002Fp\u003E\r\n\u003Cbr \u002F\u003E\r\n\u003Cp\u003E\u003Cimg src=\"\u002F-\u002Fmedia\u002Fproject\u002Fcisecurity\u002Fcisecurity\u002Fdata\u002Fmedia\u002Fimg\u002Flogos-and-icons\u002F2023\u002Fisac-circles.png?rev=2591d16c9651440f9029df82b8ccc8b9&amp;hash=66BFAD838BC2CEA5C3B2EAE3327C0A3B\" alt=\"ISAC graph\" \u002F\u003E\u003C\u002Fp\u003E\r\n\u003Cbr \u002F\u003E"}}},{"uid":"69b43a9a-b35a-4981-a803-9067d865a7f2","componentName":"CIS-RichText","dataSource":"{B8F3B276-F960-4AE5-BCBF-9F189159F293}","fields":{"content":{"value":"\u003Ch2\u003EElection Related Resources\u003C\u002Fh2\u003E\r\n\u003Cp\u003EThe Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) supports the rapidly changing cybersecurity needs of U.S. election offices.\u003C\u002Fp\u003E\r\n\u003Cp\u003E\u003Cstrong\u003EEvery U.S. election office that joins EI-ISAC automatically becomes a member of MS-ISAC.\u003C\u002Fstrong\u003E\u003C\u002Fp\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Fei-isac\"\u003ELearn more about EI-ISAC\u003C\u002Fa\u003E\r\n\u003Cbr \u002F\u003E\r\n\u003Ca class=\"c-cta--tertiary\" href=\"\u002Felections\"\u003EElection Security Tools and Resources\u003C\u002Fa\u003E\r\n\u003Cbr \u002F\u003E"}}}],"jss-right-rail":[]}}]}}],"jss-infohub":[{"uid":"27667569-6d62-45c5-8b18-76d660d7fcee","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{74CBD7AC-39D9-4B86-9510-8E86092782F3}","ph":"jss-infohub","sig":"sxa-infohub"},"placeholders":{"sxa-infohub":[{"uid":"00a374d0-c3d8-4dbe-b2e1-6d3edc458121","componentName":"CIS-InfoHub","dataSource":""}]}}],"jss-footer":[{"uid":"9464baa1-6129-4ee6-ac78-506fe703574e","componentName":"PartialDesignDynamicPlaceholder","dataSource":"","params":{"sid":"{D1A57C00-3585-4E9E-9182-C24DC35D6BAF}","ph":"jss-footer","sig":"sxa-footer"},"placeholders":{"sxa-footer":[{"uid":"a8978e0a-759d-4313-b928-327f298cd41c","componentName":"CIS-Footer","dataSource":"{39EFF40B-A685-43BF-AAB7-7D46B180FC1A}","fields":{},"placeholders":{"jss-footer-navlist-column":[{"uid":"e5145744-b8a6-4506-b0b4-302838e012b3","componentName":"CIS-Footer-NavList","dataSource":"{12E5086E-D59C-4EFF-888C-6E0238C09822}","fields":{"heading":{"value":"About"},"link":{"value":{"text":"About","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{CE0E4674-2099-1EFD-0872-24554C9B1BDF}","href":"\u002Fabout-us"}},"ref":{"value":"about"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"d264738e-7812-4d00-b72c-06cb8d4bfdf2","componentName":"CIS-Footer-NavList-Link","dataSource":"{0C2C8351-6981-477C-B685-7BBA633B8577}","fields":{"link":{"value":{"text":"Leadership","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{38C7F30C-A0A6-1FCC-B555-0F0B31319356}","href":"\u002Fabout-us\u002Fleadership"}}}},{"uid":"77595b46-2389-46e2-88bf-34abe57e9f99","componentName":"CIS-Footer-NavList-Link","dataSource":"{B6D4574D-41C3-4042-946F-A3292C8A7043}","fields":{"link":{"value":{"text":"Board","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{92F9E383-BE0B-797D-7877-5538CBB153EB}","href":"\u002Fabout-us\u002Fboard"}}}},{"uid":"2b54c015-0e62-446b-8a69-f34e2417d602","componentName":"CIS-Footer-NavList-Link","dataSource":"{A27DEE21-4F7C-4A17-95A0-3095FD8CFC98}","fields":{"link":{"value":{"text":"Communities","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{C8DE7E1E-6D97-4675-2B7C-D7D191BE4FD1}","href":"\u002Fcommunities"}}}},{"uid":"e4430129-0780-47e2-89df-8ddeea1efdc2","componentName":"CIS-Footer-NavList-Link","dataSource":"{20FC9B61-6044-4EB6-9041-A84A98278542}","fields":{"link":{"value":{"href":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002F","text":"Careers","linktype":"external","url":"https:\u002F\u002Fcareers-cisecurity.icims.com\u002F","anchor":"","target":""}}}},{"uid":"2c965f67-b655-4314-9c6d-0e66c6596c33","componentName":"CIS-Footer-NavList-Link","dataSource":"{610121FE-8393-4FE8-AAA7-E0577CCCF0DD}","fields":{"link":{"value":{"id":"{C44F2D0C-7882-EF48-AAF0-ABD11D4FD831}","querystring":"","text":"Media","anchor":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Fabout-us\u002Fmedia","title":"","class":"","linktype":"internal","href":"\u002Fabout-us\u002Fmedia"}}}},{"uid":"0bda124a-003f-4d4e-9c13-dbfaef1b0afb","componentName":"CIS-Footer-NavList-Link","dataSource":"{A5634E04-8E09-40EB-B40B-4DD4FB085808}","fields":{"link":{"value":{"text":"Testimonials","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{96FDBB45-69F1-2EB3-2D0B-27983F625023}","href":"\u002Ftestimonials"}}}},{"uid":"9982a926-d32c-43d8-a5d7-b93db0b93545","componentName":"CIS-Footer-NavList-Link","dataSource":"{FEAAEC42-5B3D-48CC-B291-6A0024A7116B}","fields":{"link":{"value":{"text":"Events","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{AF78681B-ADBD-0D67-43E1-A8933FB358B8}","href":"\u002Fevent-calendar"}}}},{"uid":"81e62ea7-9117-47fe-8832-dbad1df3293b","componentName":"CIS-Footer-NavList-Link","dataSource":"{EB40E188-7B0E-4E68-905E-873C6112F1D5}","fields":{"link":{"value":{"href":"http:\u002F\u002Fwww.uscyberchallenge.org\u002F","text":"US Cyber Challenge","linktype":"external","url":"http:\u002F\u002Fwww.uscyberchallenge.org\u002F","anchor":"","target":""}}}},{"uid":"2185db58-b7c1-4223-9279-3da66370c973","componentName":"CIS-Footer-NavList-Link","dataSource":"{CD268DD4-C58C-4D4A-9DE1-26129762EC97}","fields":{"link":{"value":{"text":"Support","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{34DDDDA5-FD41-E76F-9829-385B9EF35B03}","href":"\u002Fsupport"}}}},{"uid":"fb72e8b4-ec6b-4a96-bf50-ec748aa35d94","componentName":"CIS-Footer-NavList-Link","dataSource":"{145B4E68-B168-41B2-A3F0-F9E5B17E83EF}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","text":"Contact","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcontact-us","anchor":"","target":""}}}}]}},{"uid":"e914d3fb-6a33-40b2-bb8b-69450086ac40","componentName":"CIS-Footer-NavList","dataSource":"{083423F3-5313-4B8C-A83A-27F7A250E546}","fields":{"heading":{"value":"Products and Tools"},"link":{"value":{"text":"Products And Tools","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAB23B1-CC27-66BC-CB2F-6613F71BEA94}","href":"\u002Fcybersecurity-tools"}},"ref":{"value":"products"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"6ac739f7-9f97-4a7d-8a21-57e03a61150d","componentName":"CIS-Footer-NavList-Link","dataSource":"{05552B05-9D5F-467F-90D7-86F6C77649AE}","fields":{"link":{"value":{"text":"CIS Critical Security Controls®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{19BC09D8-ABED-CA6C-9B3B-169405015827}","href":"\u002Fcontrols"}}}},{"uid":"0a93c4b4-af89-4383-acfa-abe7ef32c5e4","componentName":"CIS-Footer-NavList-Link","dataSource":"{B0D663C7-8F1C-4CAB-B849-F82C6FA2C785}","fields":{"link":{"value":{"text":"CIS Benchmarks™","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{EEAD5F3F-F889-42AE-555F-AB0B21F4FF01}","href":"\u002Fcis-benchmarks"}}}},{"uid":"a2617d74-ba1f-492a-960a-a42f4e643576","componentName":"CIS-Footer-NavList-Link","dataSource":"{34CC9ED9-4634-460F-AD6C-F6F72EAB048F}","fields":{"link":{"value":{"text":"CIS Hardened Images®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E7B5656B-D504-03B9-3E90-66CACEFDC5AC}","href":"\u002Fcis-hardened-images"}}}},{"uid":"3722006b-9906-4445-97a4-9c0d77662013","componentName":"CIS-Footer-NavList-Link","dataSource":"{0810869C-8C37-43DC-A10F-80F181298E28}","fields":{"link":{"value":{"text":"CIS SecureSuite®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{A4AF0446-1D42-B77C-07A3-E39FBFA059A8}","href":"\u002Fcis-securesuite"}}}},{"uid":"76f3c134-d1af-439b-9531-5ee29aa04c0d","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"cc1fff93-630d-436f-a286-d55f7050a692","componentName":"CIS-Footer-NavList-Link","dataSource":"{0CD6D24B-BEC5-43CF-8732-6237BC2290F5}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","text":"CIS-CAT®Lite","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-cat-lite","anchor":"","target":""}}}},{"uid":"843e353e-5a25-48e0-b1dd-ad8b89c228f2","componentName":"CIS-Footer-NavList-Link","dataSource":"{F97428A4-ADD4-4C83-B397-6C3C367D1B32}","fields":{"link":{"value":{"text":"CIS-CAT®Pro","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{1804D342-98D7-427D-0CB2-01136C37C047}","href":"\u002Fcybersecurity-tools\u002Fcis-cat-pro"}}}},{"uid":"e092dad5-bcd5-454c-a0f1-0a92cdfb8a5c","componentName":"CIS-Footer-NavList-Link","dataSource":"{2232687A-D22C-4102-8574-8D2CD75D37CF}","fields":{"link":{"value":{"href":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","text":"CIS RAM","linktype":"external","url":"https:\u002F\u002Flearn.cisecurity.org\u002Fcis-ram","anchor":"","target":""}}}},{"uid":"52b86e48-7eec-4cf7-bc5b-afe738172fe5","componentName":"CIS-Footer-NavList-Link","dataSource":"{9266E5B3-601F-460D-8160-6A5C7B3E1879}","fields":{"link":{"value":{"text":"CIS CSAT","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E28A0486-04C9-EE4A-D85D-A29A9045942C}","href":"\u002Fcontrols\u002Fcis-controls-self-assessment-tool-cis-csat"}}}},{"uid":"9344189d-ffc6-4ff5-a317-e856d91e50c7","componentName":"CIS-Footer-NavList-Link","dataSource":"{44F65ED1-5F79-4A55-9D77-D10E1076DD8D}","fields":{"link":{"value":{"href":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","text":"CIS WorkBench","linktype":"external","url":"https:\u002F\u002Fworkbench.cisecurity.org\u002F","anchor":"","target":""}}}}]}},{"uid":"82a124a4-fb65-4ef6-9d0d-d134104d9bfc","componentName":"CIS-Footer-NavList","dataSource":"{BFE797D1-CE1F-4D73-92AA-ECEF12995772}","fields":{"heading":{"value":"For SLTT Governments"},"link":{"value":{"text":"For SLTT Governments","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{5AB4691B-C79A-D293-3D46-199080A68B6A}","href":"\u002Fisac"}},"ref":{"value":"government"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"96acc86b-723e-4da2-a5ba-f2a2eb67a96c","componentName":"CIS-Footer-NavList-Link","dataSource":"{5984A729-DCF3-435D-AC99-241AF350C9E0}","fields":{"link":{"value":{"text":"MS-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{D08DEDA9-3029-4145-7DDB-B71F23291CE5}","href":"\u002Fms-isac"}}}},{"uid":"683cd9c7-4719-4700-9f04-39796e0e0f90","componentName":"CIS-Footer-NavList-Link","dataSource":"{7B95416F-9480-462A-83DA-1ADD53017C2F}","fields":{"link":{"value":{"text":"EI-ISAC®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{52322A4C-A322-B46A-1626-350246729667}","href":"\u002Fei-isac"}}}},{"uid":"5a198c67-8816-4126-9846-45dd59b0afbe","componentName":"CIS-Footer-NavList-Link","dataSource":"{0355C105-03EA-466D-AADD-F3F4F9C351CD}","fields":{"link":{"value":{"text":"Election Resources","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{BAFE31A6-43F2-4780-8A84-BF0146DF5BD5}","href":"\u002Felections"}}}},{"uid":"c61ed8f8-190a-4592-b4bd-4d6d19b9d8eb","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"4eaac569-9a00-4ec7-9c36-58c7dda38227","componentName":"CIS-Footer-NavList-Link","dataSource":"{2BFE53C1-53D7-4A30-A819-8379DA462DBC}","fields":{"link":{"value":{"text":"CIS Services®","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{2BF3F743-4F7D-2A44-9BA1-426B3A3CFCDD}","href":"\u002Fservices"}}}},{"uid":"dbd75e0f-47c9-4976-a255-97ab90652a91","componentName":"CIS-Footer-NavList-Link","dataSource":"{E0F4A2E2-1F5C-47E6-ADC9-0068425EA8FD}","fields":{"link":{"value":{"text":"Albert Network Monitoring","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{B8C5738E-5FD1-C161-683D-3F5C78315E0E}","href":"\u002Fservices\u002Falbert-network-monitoring"}}}},{"uid":"7f934023-1c24-4c8c-950f-43b0749f3933","componentName":"CIS-Footer-NavList-Link","dataSource":"{35630969-32FC-4DD0-8A5A-9AE60025659B}","fields":{"link":{"value":{"text":"Managed Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{E8E5D5A9-41BD-E30B-787D-134B9687DFBB}","href":"\u002Fservices\u002Fmanaged-security-services-mss"}}}},{"uid":"640df112-cbf4-4ebb-a773-2959515dcbc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{4C87F991-03D4-4FAE-ACCF-E65C128FEA30}","fields":{"link":{"value":{"text":"Endpoint Security Services","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{FEC18F53-D2B1-59FF-1ADB-F7AE386AB4F2}","href":"\u002Fservices\u002Fendpoint-security-services"}}}},{"uid":"dbacf4d6-66aa-45dd-845a-4808b3bbe245","componentName":"CIS-Footer-NavList-Link","dataSource":"{0F6874E7-97E3-4010-81BA-FD5B049A3B9E}","fields":{"link":{"value":{"text":"Malicious Domain Blocking and Reporting Plus","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{C908677A-58DC-4788-97E1-DDE96D8766C3}","href":"\u002Fservices\u002Fmdbrplus"}}}},{"uid":"153cdb32-da95-4c38-8922-c13d39d0c70f","componentName":"CIS-Footer-NavList-Spacer","dataSource":"{B6498EE1-A41A-4FAE-87BE-F546E929E33D}","fields":{}},{"uid":"1f401c95-ee1f-4132-aaa5-97ccb79be8b2","componentName":"CIS-Footer-NavList-Link","dataSource":"{4B3617F6-AC3B-4B46-93C3-10947668BCAE}","fields":{"link":{"value":{"text":"CIS CyberMarket®","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{377369ED-DD43-D165-4A7E-156EBE490770}","href":"\u002Fservices\u002Fcis-cybermarket"}}}}]}},{"uid":"8782ff4a-16ae-4016-bc16-9fce5f1e5590","componentName":"CIS-Footer-NavList","dataSource":"{41A4AE22-BA78-4488-89B0-304C6E1981FB}","fields":{"heading":{"value":"Explore"},"link":{"value":{"id":"{FB4E12C1-82FC-59D2-90B1-F58388DAACC3}","querystring":"","text":"Explore","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights","linktype":"internal","href":"\u002Finsights"}},"ref":{"value":"explore"}},"placeholders":{"jss-footer-navlist-column-links":[{"uid":"62c7cf0f-9878-4c3f-8274-2063f06ad888","componentName":"CIS-Footer-NavList-Link","dataSource":"{444FEC6A-E844-4EF3-93A5-3D3341C9E9A2}","fields":{"link":{"value":{"id":"{A699BE35-8674-5BE8-B3F4-C9769391F6FE}","querystring":"","text":"Blog","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fblog","linktype":"internal","href":"\u002Finsights\u002Fblog"}}}},{"uid":"3bd043b3-d463-478e-b681-01c398493250","componentName":"CIS-Footer-NavList-Link","dataSource":"{A33D9C0E-15F2-4721-91D2-514F6785875C}","fields":{"link":{"value":{"id":"{c74111a6-95b5-5a9e-a5df-2e2a7d2884f9}","querystring":"","text":"Whitepapers","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwhite-papers","linktype":"internal","href":"\u002Finsights\u002Fwhite-papers"}}}},{"uid":"347754e1-1502-44b9-a342-79c3c0eeb4bd","componentName":"CIS-Footer-NavList-Link","dataSource":"{ADF890CC-64A8-4BC4-9147-E62D6715F54A}","fields":{"link":{"value":{"id":"{11C8CCFC-833F-576D-AF85-2C37560B1A67}","querystring":"","text":"Newsletters","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fnewsletter","linktype":"internal","href":"\u002Finsights\u002Fnewsletter"}}}},{"uid":"7168b19c-9893-4a5c-aedb-0858df521ecc","componentName":"CIS-Footer-NavList-Link","dataSource":"{2F037D55-1F06-4B2D-848B-1C07039FFF9C}","fields":{"link":{"value":{"id":"{F07F8DAA-8808-5FB4-BB19-1D0F5E5D8D9D}","querystring":"","text":"Webinars","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fwebinar","linktype":"internal","href":"\u002Finsights\u002Fwebinar"}}}},{"uid":"1f8dd1b3-3236-4b2e-a871-e1763a43ddc6","componentName":"CIS-Footer-NavList-Link","dataSource":"{98605ECF-5F35-4119-99E2-5BBB86782929}","fields":{"link":{"value":{"id":"{2992CF52-4336-5643-BB61-EB5BF0A5DB2A}","querystring":"","text":"Case Studies","anchor":"","title":"","class":"","url":"\u002Fcisecurity\u002Fcisecurity\u002Fhome\u002Finsights\u002Fcase-study","linktype":"internal","href":"\u002Finsights\u002Fcase-study"}}}},{"uid":"9f24d096-5ae4-4320-9b4c-e77b5cd31232","componentName":"CIS-Footer-NavList-Link","dataSource":"{DB31F159-66FC-4271-914A-4C9589A4ACC2}","fields":{"link":{"value":{"text":"Spotlights","anchor":"","linktype":"internal","class":"","title":"","querystring":"","id":"{19FA18AC-9BBF-569D-AB84-45572D276F62}","href":"\u002Finsights\u002Fspotlight"}}}},{"uid":"78700ef9-593f-4b51-bc07-73c8a0505950","componentName":"CIS-Footer-NavList-Link","dataSource":"{CFD0B212-070C-4798-8747-F0115D9866B9}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","text":"Videos","linktype":"external","url":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity","anchor":"","target":"_blank"}}}}]}}],"jss-footer-navlist-column-links":[],"jss-footer-utility-links":[{"uid":"64c39b1e-99b7-4e52-96e7-468d2233c0d2","componentName":"CIS-Footer-Copyright","dataSource":"{F40328ED-66D1-4513-B625-5A9F94DB9020}","fields":{}},{"uid":"6be99de6-acda-44dd-885f-537dec8218a4","componentName":"CIS-Footer-UtilityLink","dataSource":"{B9D5776A-CCA1-4CE8-81E1-8AF8341278D2}","fields":{"link":{"value":{"text":"Privacy Notice","anchor":"","linktype":"internal","class":"","title":"","target":"","querystring":"","id":"{03F9C8E2-8578-2383-F241-107EF459D053}","href":"\u002Fprivacy-notice"}}}}],"jss-footer-social-links":[{"uid":"f8128af4-282e-433e-af8d-c996bde765c2","componentName":"CIS-Footer-SocialLink","dataSource":"{63F874B5-8028-4107-9CD1-683CB6E502F1}","fields":{"link":{"value":{"href":"https:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","text":"Twitter","linktype":"external","url":"https:\u002F\u002Ftwitter.com\u002FCISecurity\u002F","anchor":"","class":"twitter","target":"_blank"}}}},{"uid":"82e90894-0a00-406c-97eb-db3d4366e95a","componentName":"CIS-Footer-SocialLink","dataSource":"{33D75F03-7FD9-4225-9E75-5412D314707A}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","text":"Facebook","linktype":"external","url":"https:\u002F\u002Fwww.facebook.com\u002FCenterforIntSec\u002F","anchor":"","class":"facebook","target":"_blank"}}}},{"uid":"e7f3d3b2-dcc3-46cb-b833-e626f131cd72","componentName":"CIS-Footer-SocialLink","dataSource":"{FE4E37CB-5B3A-4042-ACA4-42BEAAF9F1E7}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","text":"YouTube","linktype":"external","url":"https:\u002F\u002Fwww.youtube.com\u002Fuser\u002FTheCISecurity\u002F","anchor":"","class":"youtube","target":"_blank"}}}},{"uid":"7acef943-cbe1-411c-bb11-905cab2ba0d6","componentName":"CIS-Footer-SocialLink","dataSource":"{5E480327-B353-4EE8-B9C8-4E868D0AA204}","fields":{"link":{"value":{"href":"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","text":"LinkedIn","linktype":"external","url":"https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fthe-center-for-internet-security\u002F","anchor":"","class":"linkedin","target":"_blank"}}}}]}}]}}]}}},"APOLLO_STATE":{"ItemTemplate:963B37F6E98D55AC9BBCF8B1D5AA6167":{"__typename":"ItemTemplate","id":"963B37F6E98D55AC9BBCF8B1D5AA6167"},"UnknownItem:0DE95AE441AB4D019EB067441B7C2450":{"__typename":"UnknownItem","field({\"name\":\"pageTitle\"})":null,"url":"https:\u002F\u002Fcontent.sitecore.prod.cisecurity.org\u002F","path":"\u002Fsitecore\u002Fcontent","id":"0DE95AE441AB4D019EB067441B7C2450"},"UnknownItem:2FFD74BC43814E8DA34A617ECAACF6C0":{"__typename":"UnknownItem","field({\"name\":\"pageTitle\"})":null,"url":"https:\u002F\u002Fcontent.sitecore.prod.cisecurity.org\u002Fcisecurity","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity","id":"2FFD74BC43814E8DA34A617ECAACF6C0","parent":{"__ref":"UnknownItem:0DE95AE441AB4D019EB067441B7C2450"}},"UnknownItem:B6D7F4EADD0F4BBCBAB9732815CEA278":{"__typename":"UnknownItem","field({\"name\":\"pageTitle\"})":null,"url":"\u002F","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen","id":"B6D7F4EADD0F4BBCBAB9732815CEA278","parent":{"__ref":"UnknownItem:2FFD74BC43814E8DA34A617ECAACF6C0"}},"C__AppRoute:6E72CC69C1294C6AB439296957F13A11":{"__typename":"C__AppRoute","field({\"name\":\"pageTitle\"})":{"__typename":"TextField","value":"CIS Center for Internet Security"},"url":"\u002F","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome","id":"6E72CC69C1294C6AB439296957F13A11","parent":{"__ref":"UnknownItem:B6D7F4EADD0F4BBCBAB9732815CEA278"}},"CISResourceGenericPageRouteType:D08DEDA9302941457DDBB71F23291CE5":{"__typename":"CISResourceGenericPageRouteType","field({\"name\":\"pageTitle\"})":{"__typename":"TextField","value":"MS-ISAC"},"name":"ms-isac","url":"\u002Fms-isac","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fms-isac","id":"D08DEDA9302941457DDBB71F23291CE5","template":{"__typename":"ItemTemplate","name":"CIS-Resource-GenericPage-RouteType"},"field({\"name\":\"partnerTypes\"})":null,"parent":{"__ref":"C__AppRoute:6E72CC69C1294C6AB439296957F13A11"},"displayName":"MS-ISAC","field({\"name\":\"owners\"})":{"__typename":"MultilistField","value":"{D41DF5F5-1997-5662-BBBB-4AE63430599E}|{58BCBBDF-6877-560E-96F1-5F2358637BD1}"}},"CISResourceTaxonomyItem:C96E53729D5C5C6AB6EBC2EC3AF0DB6A":{"__typename":"CISResourceTaxonomyItem","name":"cis-controls-accredited-partner-type","id":"C96E53729D5C5C6AB6EBC2EC3AF0DB6A","displayName":"CIS Controls Accredited"},"CISResourceTaxonomyItem:C00E32E5F0CA5451A4538CD8F6226878":{"__typename":"CISResourceTaxonomyItem","name":"cis-controls-supporters-partner-type","id":"C00E32E5F0CA5451A4538CD8F6226878","displayName":"CIS Controls Supporters"},"CISResourceTaxonomyItem:8FF980E674055C2E9EDB0BB2A36F26CB":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-academic-institution-members-partner-type","id":"8FF980E674055C2E9EDB0BB2A36F26CB","displayName":"CIS Security Benchmarks Academic Institution Members"},"CISResourceTaxonomyItem:061072D3C719587DAD7110C625750150":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-end-user-members-partner-type","id":"061072D3C719587DAD7110C625750150","displayName":"CIS Security Benchmarks End User Members"},"CISResourceTaxonomyItem:382AAE2A46455354BAF9CEF0B981C1CD":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-government-agency-members-partner-type","id":"382AAE2A46455354BAF9CEF0B981C1CD","displayName":"CIS Security Benchmarks Government Agency Members"},"CISResourceTaxonomyItem:A31109792F825A218561BB5AB95ECAE4":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-security-service-members-partner-type","id":"A31109792F825A218561BB5AB95ECAE4","displayName":"CIS Security Benchmarks Security Service Members"},"CISResourceTaxonomyItem:84CBF2CF87D65C0DB3F101325A78A464":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-security-vendor-members-certified-partner-type","id":"84CBF2CF87D65C0DB3F101325A78A464","displayName":"CIS Security Benchmarks Security Vendor Members Certified"},"CISResourceTaxonomyItem:5D4301A7BF38538AA7D9690B276EED2A":{"__typename":"CISResourceTaxonomyItem","name":"cis-security-benchmarks-security-vendor-members-uncertified-partner-type","id":"5D4301A7BF38538AA7D9690B276EED2A","displayName":"CIS Security Benchmarks Security Vendor Members Uncertified"},"CISResourceTaxonomyItem:C3F7E3CD3AD55EE19F111A6671B46647":{"__typename":"CISResourceTaxonomyItem","name":"eiisac-partners-partner-type","id":"C3F7E3CD3AD55EE19F111A6671B46647","displayName":"EI-ISAC Partners"},"CISResourceTaxonomyItem:BE44C2520E905F7BA632CCB40F5CF1AA":{"__typename":"CISResourceTaxonomyItem","name":"msisac-local-governments-partner-type","id":"BE44C2520E905F7BA632CCB40F5CF1AA","displayName":"MS-ISAC Local governments"},"CISResourceTaxonomyItem:B8C22135037F5FF49A45FDF31C7F895E":{"__typename":"CISResourceTaxonomyItem","name":"msisac-states-partner-type","id":"B8C22135037F5FF49A45FDF31C7F895E","displayName":"MS-ISAC states"},"CISResourceTaxonomyItem:3A4F1A9880F15DD8A4DE419CFA8F81DF":{"__typename":"CISResourceTaxonomyItem","name":"msisac-territories-partner-type","id":"3A4F1A9880F15DD8A4DE419CFA8F81DF","displayName":"MS-ISAC Territories"},"CISResourceTaxonomyItem:1E487A9AB8665CBB87738E9E9E50C66E":{"__typename":"CISResourceTaxonomyItem","name":"msisac-tribes-partner-type","id":"1E487A9AB8665CBB87738E9E9E50C66E","displayName":"MS-ISAC Tribes"},"ROOT_QUERY":{"__typename":"Query","item({\"path\":\"d08deda9-3029-4145-7ddb-b71f23291ce5\"})":{"__ref":"CISResourceGenericPageRouteType:D08DEDA9302941457DDBB71F23291CE5"},"item({\"path\":\"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FTaxonomies\u002FPartnerTypes\"})":{"__typename":"UnknownItem","children":[{"__ref":"CISResourceTaxonomyItem:C96E53729D5C5C6AB6EBC2EC3AF0DB6A"},{"__ref":"CISResourceTaxonomyItem:C00E32E5F0CA5451A4538CD8F6226878"},{"__ref":"CISResourceTaxonomyItem:8FF980E674055C2E9EDB0BB2A36F26CB"},{"__ref":"CISResourceTaxonomyItem:061072D3C719587DAD7110C625750150"},{"__ref":"CISResourceTaxonomyItem:382AAE2A46455354BAF9CEF0B981C1CD"},{"__ref":"CISResourceTaxonomyItem:A31109792F825A218561BB5AB95ECAE4"},{"__ref":"CISResourceTaxonomyItem:84CBF2CF87D65C0DB3F101325A78A464"},{"__ref":"CISResourceTaxonomyItem:5D4301A7BF38538AA7D9690B276EED2A"},{"__ref":"CISResourceTaxonomyItem:C3F7E3CD3AD55EE19F111A6671B46647"},{"__ref":"CISResourceTaxonomyItem:BE44C2520E905F7BA632CCB40F5CF1AA"},{"__ref":"CISResourceTaxonomyItem:B8C22135037F5FF49A45FDF31C7F895E"},{"__ref":"CISResourceTaxonomyItem:3A4F1A9880F15DD8A4DE419CFA8F81DF"},{"__ref":"CISResourceTaxonomyItem:1E487A9AB8665CBB87738E9E9E50C66E"}]},"cisInfoHub({\"pageIndex\":0,\"path\":\"d08deda9-3029-4145-7ddb-b71f23291ce5\"})":{"__ref":"CISResourcePressReleaseRouteType:C30CBE6206164097B6F29F473EF3960C"},"cisInfoHub({\"pageIndex\":1,\"path\":\"d08deda9-3029-4145-7ddb-b71f23291ce5\"})":{"__ref":"CISResourceWhitePaperRouteType:96391F7AAD6B4F359B9200F0333D4258"},"cisInfoHub({\"pageIndex\":2,\"path\":\"d08deda9-3029-4145-7ddb-b71f23291ce5\"})":{"__ref":"CISResourceAdvisoryRouteType:FDB766C9032BB9108B78CBDBB6D5A6E1"},"cisInfoHub({\"pageIndex\":3,\"path\":\"d08deda9-3029-4145-7ddb-b71f23291ce5\"})":{"__ref":"CISResourceAdvisoryRouteType:3D6AA50D05A29BE7F0FB29F116130FC9"},"item({\"path\":\"\u002Fsitecore\u002Ftemplates\u002FProject\u002Fngen\"})":{"__typename":"UnknownItem","children":[{"__typename":"UnknownItem","name":"App Route","displayName":"App Route"},{"__typename":"UnknownItem","name":"CIS-Accordion Rendering Parameters","displayName":"Accordion Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Accordion-Item","displayName":"Accordion Item"},{"__typename":"UnknownItem","name":"CIS-Accordion-Item Rendering Parameters","displayName":"Accordion Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Alert","displayName":"Alert Primary"},{"__typename":"UnknownItem","name":"CIS-Alert Rendering Parameters","displayName":"Alert Primary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Alert-Secondary","displayName":"Alert Secondary"},{"__typename":"UnknownItem","name":"CIS-Alert-Secondary Rendering Parameters","displayName":"Alert Secondary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Banner","displayName":"Banner"},{"__typename":"UnknownItem","name":"CIS-Banner Rendering Parameters","displayName":"Banner Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Benchmark-CIS-CAT-Pro Rendering Parameters","displayName":"Benchmark CIS-CAT Pro Table Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote","displayName":"Blockquote"},{"__typename":"UnknownItem","name":"CIS-Blockquote Rendering Parameters","displayName":"Blockquote Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Blue-Box","displayName":"Blockquote Blue Box"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Blue-Box Rendering Parameters","displayName":"Blockquote Blue Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel","displayName":"Blockquote Carousel"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel Rendering Parameters","displayName":"Blockquote Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel-Item","displayName":"Blockquote Carousel Item"},{"__typename":"UnknownItem","name":"CIS-Blockquote-Carousel-Item Rendering Parameters","displayName":"Blockquote Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Breadcrumb Rendering Parameters","displayName":"Breadcrumb Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Checkmark-Table","displayName":"Checkmark Table"},{"__typename":"UnknownItem","name":"CIS-Checkmark-Table Rendering Parameters","displayName":"Checkmark Table Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cloud-Provider","displayName":"CIS-Cloud-Provider"},{"__typename":"UnknownItem","name":"CIS-ContentBlock","displayName":"Content Block"},{"__typename":"UnknownItem","name":"CIS-ContentBlock Rendering Parameters","displayName":"Content Block Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-CTA","displayName":"Content Block With CTA"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-CTA Rendering Parameters","displayName":"Content Block With CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-Label","displayName":"Content Block With Label"},{"__typename":"UnknownItem","name":"CIS-Content-Block-With-Label Rendering Parameters","displayName":"Content Block With Label Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Blue-Box","displayName":"Content Blue Box"},{"__typename":"UnknownItem","name":"CIS-Content-Blue-Box Rendering Parameters","displayName":"Content Blue Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Card","displayName":"Content Card"},{"__typename":"UnknownItem","name":"CIS-Content-Card Rendering Parameters","displayName":"Content Card Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Cards","displayName":"Content Cards"},{"__typename":"UnknownItem","name":"CIS-Content-Cards Rendering Parameters","displayName":"Content Cards Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Carousel","displayName":"Content Carousel"},{"__typename":"UnknownItem","name":"CIS-Content-Carousel Rendering Parameters","displayName":"Content Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Carousel-Item","displayName":"Content Carousel Item"},{"__typename":"UnknownItem","name":"CIS-Content-Carousel-Item Rendering Parameters","displayName":"Content Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Gray-Box","displayName":"Content Gray Box"},{"__typename":"UnknownItem","name":"CIS-Content-Gray-Box Rendering Parameters","displayName":"Content Gray Box Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Three-Column","displayName":"Content Three Column"},{"__typename":"UnknownItem","name":"CIS-Content-Three-Column Rendering Parameters","displayName":"Content Three Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Content-Two-Column","displayName":"Content Two Column"},{"__typename":"UnknownItem","name":"CIS-Content-Two-Column Rendering Parameters","displayName":"Content Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Control","displayName":"CIS-Control"},{"__typename":"UnknownItem","name":"CIS-Control-Mapping","displayName":"CIS-Control-Mapping"},{"__typename":"UnknownItem","name":"CIS-Control-MappingElement","displayName":"CIS-Control-MappingElement"},{"__typename":"UnknownItem","name":"CIS-Control-Safeguard","displayName":"CIS-Control-Safeguard"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator","displayName":"Controls Navigator"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator Rendering Parameters","displayName":"Controls Navigator Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector","displayName":"Controls Navigator Selector"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector Rendering Parameters","displayName":"Controls Navigator Selector Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Controls-Navigator-Selector-Item","displayName":"Controls Navigator Selector Item"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel","displayName":"CTA Carousel"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel Rendering Parameters","displayName":"CTA Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item","displayName":"CTA Carousel Item"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item Rendering Parameters","displayName":"CTA Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item-CTA","displayName":"CTA Carousel Item - CTA"},{"__typename":"UnknownItem","name":"CIS-CTA-Carousel-Item-CTA Rendering Parameters","displayName":"CTA Carousel Item - CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Primary","displayName":"CTA - Primary"},{"__typename":"UnknownItem","name":"CIS-CTA-Primary Rendering Parameters","displayName":"CTA - Primary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Secondary","displayName":"CTA - Secondary"},{"__typename":"UnknownItem","name":"CIS-CTA-Secondary Rendering Parameters","displayName":"CTA - Secondary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-CTA-Tertiary","displayName":"CTA - Tertiary"},{"__typename":"UnknownItem","name":"CIS-CTA-Tertiary Rendering Parameters","displayName":"CTA - Tertiary Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools","displayName":"Cybersecurity Tools"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools Rendering Parameters","displayName":"Cybersecurity Tools Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools-Cost-Item","displayName":"Cybersecurity Tools Cost Item"},{"__typename":"UnknownItem","name":"CIS-Cybersecurity-Tools-Item","displayName":"Cybersecurity Tools Item"},{"__typename":"UnknownItem","name":"CIS-DropDown-ContentWithLinks","displayName":"Drop Down Content With Links"},{"__typename":"UnknownItem","name":"CIS-DropDown-ContentWithLinks Rendering Parameters","displayName":"Drop Down Content With Links Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinks","displayName":"Drop Down Full Width With Links"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinks Rendering Parameters","displayName":"Drop Down Full Width With Links Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinkSection","displayName":"Drop Down Full Width With Link Section"},{"__typename":"UnknownItem","name":"CIS-DropDown-FullWidthLinkSection Rendering Parameters","displayName":"Drop Down Full Width With Link Section Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection","displayName":"Dropdown Link Section"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection Rendering Parameters","displayName":"Dropdown Link Section Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection-Bordered","displayName":"Dropdown Link Section with Border"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSection-Bordered Rendering Parameters","displayName":"Dropdown Link Section with Border Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSectionWithBg","displayName":"Dropdown Link Section with Background"},{"__typename":"UnknownItem","name":"CIS-DropDown-LinkSectionWithBg Rendering Parameters","displayName":"Dropdown Link Section with Background Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-DropDown-TwoColumn","displayName":"Dropdown Two Column"},{"__typename":"UnknownItem","name":"CIS-DropDown-TwoColumn Rendering Parameters","displayName":"Dropdown Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Facebook-Metadata","displayName":"CIS-Facebook-Metadata"},{"__typename":"UnknownItem","name":"CIS-FAQ Rendering Parameters","displayName":"Accordion Cluster Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item","displayName":"Accordion Cluster Item"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item Rendering Parameters","displayName":"Accordion Cluster Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item-Headline","displayName":"Accordion Headline"},{"__typename":"UnknownItem","name":"CIS-FAQ-Item-Headline Rendering Parameters","displayName":"Accordion Headline Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Featured-Article","displayName":"Featured Article"},{"__typename":"UnknownItem","name":"CIS-Featured-Article Rendering Parameters","displayName":"Featured Article Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer","displayName":"Footer"},{"__typename":"UnknownItem","name":"CIS-Footer Rendering Parameters","displayName":"Footer Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-Copyright","displayName":"Footer Copyright"},{"__typename":"UnknownItem","name":"CIS-Footer-Copyright Rendering Parameters","displayName":"Footer Copyright Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList","displayName":"Footer Nav List"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList Rendering Parameters","displayName":"Footer Nav List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Link","displayName":"Footer Nav List Link"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Link Rendering Parameters","displayName":"Footer Nav List Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Spacer","displayName":"Footer Nav List Spacer"},{"__typename":"UnknownItem","name":"CIS-Footer-NavList-Spacer Rendering Parameters","displayName":"Footer Nav List Spacer Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-SocialLink","displayName":"Footer Social Link"},{"__typename":"UnknownItem","name":"CIS-Footer-SocialLink Rendering Parameters","displayName":"Footer Social Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Footer-UtilityLink","displayName":"Footer Utility Link"},{"__typename":"UnknownItem","name":"CIS-Footer-UtilityLink Rendering Parameters","displayName":"Footer Utility Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-From-The-Blog","displayName":"From The Blog"},{"__typename":"UnknownItem","name":"CIS-From-The-Blog Rendering Parameters","displayName":"From The Blog Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Grid","displayName":"Grid Layout"},{"__typename":"UnknownItem","name":"CIS-Grid Rendering Parameters","displayName":"Grid Layout Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Grid-Item","displayName":"Grid Item"},{"__typename":"UnknownItem","name":"CIS-Grid-Item Rendering Parameters","displayName":"Grid Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-Cloud-Provider-List","displayName":"Hardened Image Cloud Provider List"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-Cloud-Provider-List Rendering Parameters","displayName":"Hardened Image Cloud Provider List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List","displayName":"Hardened Image List"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List Rendering Parameters","displayName":"Hardened Image List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List-Column-Header","displayName":"Hardened Image List Column Header"},{"__typename":"UnknownItem","name":"CIS-Hardened-Images-List-Column-Header Rendering Parameters","displayName":"Hardened Image List Column Header Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Header","displayName":"Header"},{"__typename":"UnknownItem","name":"CIS-Header Rendering Parameters","displayName":"Header Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-HeaderUtility-Link","displayName":"Header Utility Link"},{"__typename":"UnknownItem","name":"CIS-HeaderUtility-Link Rendering Parameters","displayName":"Header Utility Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote","displayName":"Home Blockquote"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote Rendering Parameters","displayName":"Home Blockquote Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote-Item","displayName":"Home Blockquote Item"},{"__typename":"UnknownItem","name":"CIS-Home-Blockquote-Item Rendering Parameters","displayName":"Home Blockquote Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Card-Item","displayName":"Home Card Item"},{"__typename":"UnknownItem","name":"CIS-Home-Card-Item Rendering Parameters","displayName":"Home Card Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Cards","displayName":"Home Cards"},{"__typename":"UnknownItem","name":"CIS-Home-Cards Rendering Parameters","displayName":"Home Cards Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Featured-CTA","displayName":"Home Featured CTA"},{"__typename":"UnknownItem","name":"CIS-Home-Featured-CTA Rendering Parameters","displayName":"Home Featured CTA Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-HeroLayout","displayName":"Home Hero"},{"__typename":"UnknownItem","name":"CIS-Home-HeroLayout Rendering Parameters","displayName":"Home Hero Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Industry","displayName":"Home Industry"},{"__typename":"UnknownItem","name":"CIS-Home-Industry Rendering Parameters","displayName":"Home Industry Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Masthead","displayName":"Home Masthead"},{"__typename":"UnknownItem","name":"CIS-Home-Masthead Rendering Parameters","displayName":"Home Masthead Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Home-Update","displayName":"Home Update"},{"__typename":"UnknownItem","name":"CIS-Home-Update Rendering Parameters","displayName":"Home Update Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Icon-Group","displayName":"Icon Group"},{"__typename":"UnknownItem","name":"CIS-Icon-Group Rendering Parameters","displayName":"Icon Group Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Icon-Group-Item","displayName":"Icon Group Item"},{"__typename":"UnknownItem","name":"CIS-Icon-Group-Item Rendering Parameters","displayName":"Icon Group Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel","displayName":"Image Carousel"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel Rendering Parameters","displayName":"Image Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel-Item","displayName":"Carousel Image"},{"__typename":"UnknownItem","name":"CIS-Image-Carousel-Item Rendering Parameters","displayName":"Carousel Image Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-InfoHub Rendering Parameters","displayName":"Info Hub Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-InfoHub-Pages","displayName":"CIS-InfoHub-Pages"},{"__typename":"UnknownItem","name":"CIS-K12-Graphic","displayName":"K12 Graphic"},{"__typename":"UnknownItem","name":"CIS-K12-Graphic Rendering Parameters","displayName":"K12 Graphic Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-K12-Graphic-Item","displayName":"K12 Graphic Item"},{"__typename":"UnknownItem","name":"CIS-K12-Graphic-Item Rendering Parameters","displayName":"K12 Graphic Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Advisory","displayName":"Latest Advisory"},{"__typename":"UnknownItem","name":"CIS-Latest-Advisory Rendering Parameters","displayName":"Latest Advisory Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Alert","displayName":"Latest Alert"},{"__typename":"UnknownItem","name":"CIS-Latest-Alert Rendering Parameters","displayName":"Latest Alert Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights Rendering Parameters","displayName":"Latest Insights Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights-Item-Static","displayName":"Latest Insight Item - Static"},{"__typename":"UnknownItem","name":"CIS-Latest-Insights-Item-Static Rendering Parameters","displayName":"Latest Insight Item - Static Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Latest-Spotlight","displayName":"Latest Spotlight"},{"__typename":"UnknownItem","name":"CIS-Latest-Spotlight Rendering Parameters","displayName":"Latest Spotlight Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing","displayName":"Insights Latest Container"},{"__typename":"UnknownItem","name":"CIS-List-Landing Rendering Parameters","displayName":"Insights Latest Container Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Featured","displayName":"Insight Featured Item"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Featured Rendering Parameters","displayName":"Insight Featured Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Item","displayName":"Insight Latest Item"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Item Rendering Parameters","displayName":"Insight Latest Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Link","displayName":"Insight Link"},{"__typename":"UnknownItem","name":"CIS-List-Landing-Link Rendering Parameters","displayName":"Insight Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link","displayName":"List Link with Description"},{"__typename":"UnknownItem","name":"CIS-List-Link Rendering Parameters","displayName":"List Link with Description Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link-Extra-Links","displayName":"List Link with Description and Extra Link"},{"__typename":"UnknownItem","name":"CIS-List-Link-Extra-Links Rendering Parameters","displayName":"List Link with Description and Extra Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Link-Title","displayName":"List Link Title"},{"__typename":"UnknownItem","name":"CIS-List-Link-Title Rendering Parameters","displayName":"List Link Title Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Hero","displayName":"Masthead - List Page"},{"__typename":"UnknownItem","name":"CIS-List-Page-Hero Rendering Parameters","displayName":"Masthead - List Page Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Link","displayName":"List Page Link"},{"__typename":"UnknownItem","name":"CIS-List-Page-Link Rendering Parameters","displayName":"List Page Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-List-Page-Right-Rail","displayName":"List Page Right Rail"},{"__typename":"UnknownItem","name":"CIS-List-Page-Right-Rail Rendering Parameters","displayName":"List Page Right Rail Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead","displayName":"Masthead"},{"__typename":"UnknownItem","name":"CIS-Masthead Rendering Parameters","displayName":"Masthead Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column","displayName":"Masthead - Two Column"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column Rendering Parameters","displayName":"Masthead - Two Column Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column-Link","displayName":"Masthead - Two Column - Link"},{"__typename":"UnknownItem","name":"CIS-Masthead-Two-Column-Link Rendering Parameters","displayName":"Masthead - Two Column - Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Media-Masthead","displayName":"Masthead - Media"},{"__typename":"UnknownItem","name":"CIS-Media-Masthead Rendering Parameters","displayName":"Masthead - Media Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Members","displayName":"Members"},{"__typename":"UnknownItem","name":"CIS-Members Rendering Parameters","displayName":"Members Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Members-List","displayName":"CIS-Members-List"},{"__typename":"UnknownItem","name":"CIS-Navigation-Link","displayName":"Navigation Link"},{"__typename":"UnknownItem","name":"CIS-Navigation-Link Rendering Parameters","displayName":"Navigation Link Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-PageTitle","displayName":"Page Title"},{"__typename":"UnknownItem","name":"CIS-PageTitle Rendering Parameters","displayName":"Page Title Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Price-Selector","displayName":"Price Selector"},{"__typename":"UnknownItem","name":"CIS-Price-Selector Rendering Parameters","displayName":"Price Selector Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile","displayName":"Profile"},{"__typename":"UnknownItem","name":"CIS-Profile Rendering Parameters","displayName":"Profile Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile-List","displayName":"Profile List"},{"__typename":"UnknownItem","name":"CIS-Profile-List Rendering Parameters","displayName":"Profile List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Profile-List-Item","displayName":"Profile Item"},{"__typename":"UnknownItem","name":"CIS-Profile-List-Item Rendering Parameters","displayName":"Profile Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Related-Resources","displayName":"Related Resources"},{"__typename":"UnknownItem","name":"CIS-Related-Resources Rendering Parameters","displayName":"Related Resources Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory Rendering Parameters","displayName":"Resource Advisory Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-AffectedSystem","displayName":"Advisory Affected System"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-Data","displayName":"CIS-Resource-Advisory-Data"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-Reference","displayName":"Advisory Reference"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RelatedBenchmark","displayName":"Advisory Related Benchmark"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RelatedControl","displayName":"Advisory Related Control"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RiskCategory","displayName":"Advisory Risk Category"},{"__typename":"UnknownItem","name":"CIS-Resource-Advisory-RouteType","displayName":"Advisory"},{"__typename":"UnknownItem","name":"CIS-Resource-Alert-Level","displayName":"CIS-Resource-Alert-Level"},{"__typename":"UnknownItem","name":"CIS-Resource-BaseData","displayName":"CIS-Resource-BaseData"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark Rendering Parameters","displayName":"Resource Benchmark Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-APIKey","displayName":"Benchmark API Key"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Category","displayName":"CIS-Resource-Benchmark-Category"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Data","displayName":"CIS-Resource-Benchmark-Data"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Document","displayName":"CIS-Resource-Benchmark-Document"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-GlobalData","displayName":"CIS-Resource-Benchmark-GlobalData"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Image","displayName":"CIS-Resource-Benchmark-Image"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-List","displayName":"Benchmark List"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-List Rendering Parameters","displayName":"Benchmark List Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-RemediationKit","displayName":"CIS-Resource-Benchmark-RemediationKit"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-RouteType","displayName":"Benchmark"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-SubCategory","displayName":"CIS-Resource-Benchmark-SubCategory"},{"__typename":"UnknownItem","name":"CIS-Resource-Benchmark-Version","displayName":"CIS-Resource-Benchmark-Version"},{"__typename":"UnknownItem","name":"CIS-Resource-Blog Rendering Parameters","displayName":"Resource Blog Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-BlogData","displayName":"CIS-Resource-BlogData"},{"__typename":"UnknownItem","name":"CIS-Resource-Blog-RouteType","displayName":"Blog Post"},{"__typename":"UnknownItem","name":"CIS-Resource-BroadcastData","displayName":"CIS-Resource-BroadcastData"},{"__typename":"UnknownItem","name":"CIS-Resource-CaseStudy Rendering Parameters","displayName":"Resource Case Study Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-CaseStudy-RouteType","displayName":"Case Study"},{"__typename":"UnknownItem","name":"CIS-Resource-DownloadData","displayName":"CIS-Resource-DownloadData"},{"__typename":"UnknownItem","name":"CIS-Resource-GenericPage Rendering Parameters","displayName":"Resource Generic Page Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-GenericPage-RouteType","displayName":"Page"},{"__typename":"UnknownItem","name":"CIS-Resource-Media-Mention Rendering Parameters","displayName":"Resource Media-Mention Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Media-Mention-RouteType","displayName":"Media Mention"},{"__typename":"UnknownItem","name":"CIS-Resource-Newsletter Rendering Parameters","displayName":"Resource Newsletter Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Newsletter-RouteType","displayName":"Newsletter"},{"__typename":"UnknownItem","name":"CIS-Resource-PagedListing","displayName":"Resource Paged Listing"},{"__typename":"UnknownItem","name":"CIS-Resource-PagedListing Rendering Parameters","displayName":"Resource Paged Listing Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Partner Rendering Parameters","displayName":"Resource Partner Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerData","displayName":"CIS-Resource-PartnerData"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerListing","displayName":"Resource Partner Listing"},{"__typename":"UnknownItem","name":"CIS-Resource-PartnerListing Rendering Parameters","displayName":"Resource Partner Listing Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Partner-RouteType","displayName":"Partner"},{"__typename":"UnknownItem","name":"CIS-Resource-Podcast Rendering Parameters","displayName":"Resource Podcast Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-PodcastData","displayName":"CIS-Resource-PodcastData"},{"__typename":"UnknownItem","name":"CIS-Resource-Podcast-RouteType","displayName":"Podcast"},{"__typename":"UnknownItem","name":"CIS-Resource-Press-Release Rendering Parameters","displayName":"Resource Press Release Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Press-Release-RouteType","displayName":"Press Release"},{"__typename":"UnknownItem","name":"CIS-Resource-RightColumn","displayName":"CIS-Resource-RightColumn"},{"__typename":"UnknownItem","name":"CIS-Resource-Spotlight Rendering Parameters","displayName":"Resource Spotlight Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Spotlight-RouteType","displayName":"Spotlight"},{"__typename":"UnknownItem","name":"CIS-Resource-Taxonomy-Item","displayName":"CIS-Resource-Taxonomy-Item"},{"__typename":"UnknownItem","name":"CIS-Resource-Webinar Rendering Parameters","displayName":"Resource Webinar Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-Webinar-RouteType","displayName":"Webinar"},{"__typename":"UnknownItem","name":"CIS-Resource-White-Paper Rendering Parameters","displayName":"Resource White-Paper Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Resource-White-PaperData","displayName":"CIS-Resource-White-PaperData"},{"__typename":"UnknownItem","name":"CIS-Resource-White-Paper-RouteType","displayName":"White Paper"},{"__typename":"UnknownItem","name":"CIS-RichText","displayName":"Rich Text Editor"},{"__typename":"UnknownItem","name":"CIS-RichText Rendering Parameters","displayName":"Rich Text Editor Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Search","displayName":"Search"},{"__typename":"UnknownItem","name":"CIS-Search Rendering Parameters","displayName":"Search Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel","displayName":"Steps Carousel"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel Rendering Parameters","displayName":"Steps Carousel Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel-Item","displayName":"Steps Carousel Item"},{"__typename":"UnknownItem","name":"CIS-Steps-Carousel-Item Rendering Parameters","displayName":"Steps Carousel Item Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-StructuredData-ContactPoint","displayName":"Structured Data - Contact Point"},{"__typename":"UnknownItem","name":"CIS-StructuredData-Organization","displayName":"Structured Data - Organization"},{"__typename":"UnknownItem","name":"CIS-StructuredData-PostalAddress","displayName":"Structured Data - Postal Address"},{"__typename":"UnknownItem","name":"CIS-StructuredData-Webpage","displayName":"Structured Data - Webpage"},{"__typename":"UnknownItem","name":"CIS-StructuredData-Website","displayName":"Structured Data - Website"},{"__typename":"UnknownItem","name":"CIS-StructuredData-Website Rendering Parameters","displayName":"Structured Data - Website Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs","displayName":"Tabs"},{"__typename":"UnknownItem","name":"CIS-Tabs Rendering Parameters","displayName":"Primary Tabs Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary Rendering Parameters","displayName":"Secondary Tabs Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary-Tab","displayName":"Secondary Tab"},{"__typename":"UnknownItem","name":"CIS-Tabs-Secondary-Tab Rendering Parameters","displayName":"Secondary Tab Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Tabs-Tab","displayName":"Primary Tab"},{"__typename":"UnknownItem","name":"CIS-Tabs-Tab Rendering Parameters","displayName":"Primary Tab Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Twitter-Metadata","displayName":"CIS-Twitter-Metadata"},{"__typename":"UnknownItem","name":"CIS-UX-Example Rendering Parameters","displayName":"CIS-UX-Example Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Wistia-Audio","displayName":"Wistia Audio"},{"__typename":"UnknownItem","name":"CIS-Wistia-Audio Rendering Parameters","displayName":"Wistia Audio Rendering Parameters"},{"__typename":"UnknownItem","name":"CIS-Wistia-Video","displayName":"Wistia Video"},{"__typename":"UnknownItem","name":"CIS-Wistia-Video Rendering Parameters","displayName":"Wistia Video Rendering Parameters"},{"__typename":"UnknownItem","name":"JSS Site","displayName":"JSS Site"},{"__typename":"UnknownItem","name":"JSS Tenant","displayName":"JSS Tenant"},{"__typename":"UnknownItem","name":"Page Design Folder","displayName":"Page Design Folder"},{"__typename":"UnknownItem","name":"Page Designs","displayName":"Page Designs"},{"__typename":"UnknownItem","name":"Partial Design Folder","displayName":"Partial Design Folder"},{"__typename":"UnknownItem","name":"Partial Designs","displayName":"Partial Designs"},{"__typename":"UnknownItem","name":"PartialDesignDynamicPlaceholder","displayName":"PartialDesignDynamicPlaceholder"},{"__typename":"UnknownItem","name":"PartialDesignDynamicPlaceholder Rendering Parameters","displayName":"PartialDesignDynamicPlaceholder Rendering Parameters"},{"__typename":"UnknownItem","name":"Test-Tracker Rendering Parameters","displayName":"Test-Tracker Rendering Parameters"}]},"item({\"path\":\"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002FContent\u002FTaxonomies\u002FOwners\"})":{"__typename":"UnknownItem","children":[{"__ref":"CISResourceTaxonomyItem:2E6FD60206DA5187A787AE5BE20DD812"},{"__ref":"CISResourceTaxonomyItem:74CCE205EB59520FA66B4FD1FC70F279"},{"__ref":"CISResourceTaxonomyItem:EF5341028C875E0DB4C6FDCF23E563C7"},{"__ref":"CISResourceTaxonomyItem:44BCB76B7F76576C947A02B957604BC4"},{"__ref":"CISResourceTaxonomyItem:58BCBBDF6877560E96F15F2358637BD1"},{"__ref":"CISResourceTaxonomyItem:46D73C5EC9115BBDBD34DD2DB2562E2B"},{"__ref":"CISResourceTaxonomyItem:DBCE1B447F3B5F29AC2A408492C4DC47"},{"__ref":"CISResourceTaxonomyItem:D41DF5F519975662BBBB4AE63430599E"}]}},"CISResourcePressReleaseRouteType:C30CBE6206164097B6F29F473EF3960C":{"__typename":"CISResourcePressReleaseRouteType","id":"C30CBE6206164097B6F29F473EF3960C","name":"CIS Releases Results of 18 Month Study of US Tribal Organization Cybersecurity","displayName":"CIS Releases Results of 18 Month Study of U.S. Tribal Organization Cybersecurity","url":"\u002Fabout-us\u002Fmedia\u002Fpress-release\u002Fcis-releases-results-of-18-month-study-of-us-tribal-organization-cybersecurity","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fabout-us\u002Fmedia\u002Fpress-release\u002FCIS Releases Results of 18 Month Study of US Tribal Organization Cybersecurity","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Press-Release-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240919T181000Z","dateValue":1726769400000}},"CISResourceWhitePaperRouteType:96391F7AAD6B4F359B9200F0333D4258":{"__typename":"CISResourceWhitePaperRouteType","id":"96391F7AAD6B4F359B9200F0333D4258","name":"DMARC Guide Microsoft 365 and Google Workspace","displayName":"DMARC Guide: Microsoft 365 and Google Workspace","url":"\u002Finsights\u002Fwhite-papers\u002Fdmarc-guide-microsoft-365-and-google-workspace","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Finsights\u002Fwhite-papers\u002FDMARC Guide Microsoft 365 and Google Workspace","template":{"__typename":"ItemTemplate","name":"CIS-Resource-White-Paper-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240918T142300Z","dateValue":1726669380000}},"CISResourceAdvisoryRouteType:FDB766C9032BB9108B78CBDBB6D5A6E1":{"__typename":"CISResourceAdvisoryRouteType","id":"FDB766C9032BB9108B78CBDBB6D5A6E1","name":"multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-103","displayName":"2024-103: Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution","url":"\u002Fadvisory\u002Fmultiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-103","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fadvisory\u002Fmultiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2024-103","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Advisory-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240917T213219","dateValue":1726623139000}},"CISResourceAdvisoryRouteType:3D6AA50D05A29BE7F0FB29F116130FC9":{"__typename":"CISResourceAdvisoryRouteType","id":"3D6AA50D05A29BE7F0FB29F116130FC9","name":"multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2024-102","displayName":"2024-102: Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution","url":"\u002Fadvisory\u002Fmultiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2024-102","path":"\u002Fsitecore\u002Fcontent\u002Fcisecurity\u002Fngen\u002Fhome\u002Fadvisory\u002Fmultiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2024-102","template":{"__typename":"ItemTemplate","name":"CIS-Resource-Advisory-RouteType"},"field({\"name\":\"publishedAt\"})":{"__typename":"DateField","value":"20240916T191129","dateValue":1726528289000}},"CISResourceTaxonomyItem:2E6FD60206DA5187A787AE5BE20DD812":{"__typename":"CISResourceTaxonomyItem","id":"2E6FD60206DA5187A787AE5BE20DD812","name":"cis-benchmarks-owner","displayName":"CIS Benchmarks"},"CISResourceTaxonomyItem:74CCE205EB59520FA66B4FD1FC70F279":{"__typename":"CISResourceTaxonomyItem","id":"74CCE205EB59520FA66B4FD1FC70F279","name":"cis-controls-owner","displayName":"CIS Controls"},"CISResourceTaxonomyItem:EF5341028C875E0DB4C6FDCF23E563C7":{"__typename":"CISResourceTaxonomyItem","id":"EF5341028C875E0DB4C6FDCF23E563C7","name":"cis-cybermarket-owner","displayName":"CIS CyberMarket"},"CISResourceTaxonomyItem:44BCB76B7F76576C947A02B957604BC4":{"__typename":"CISResourceTaxonomyItem","id":"44BCB76B7F76576C947A02B957604BC4","name":"cis-hardened-images-owner","displayName":"CIS Hardened Images"},"CISResourceTaxonomyItem:58BCBBDF6877560E96F15F2358637BD1":{"__typename":"CISResourceTaxonomyItem","id":"58BCBBDF6877560E96F15F2358637BD1","name":"cis-securesuite-owner","displayName":"CIS SecureSuite"},"CISResourceTaxonomyItem:46D73C5EC9115BBDBD34DD2DB2562E2B":{"__typename":"CISResourceTaxonomyItem","id":"46D73C5EC9115BBDBD34DD2DB2562E2B","name":"cis-services-owner","displayName":"CIS Services"},"CISResourceTaxonomyItem:DBCE1B447F3B5F29AC2A408492C4DC47":{"__typename":"CISResourceTaxonomyItem","id":"DBCE1B447F3B5F29AC2A408492C4DC47","name":"eiisac-owner","displayName":"EI-ISAC"},"CISResourceTaxonomyItem:D41DF5F519975662BBBB4AE63430599E":{"__typename":"CISResourceTaxonomyItem","id":"D41DF5F519975662BBBB4AE63430599E","name":"msisac-owner","displayName":"MS-ISAC"}}}</script></body></html>
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda