Whistic Now on v7.1 of CIS Controls

October 23, 2020

The CIS Controls are internationally recognized cybersecurity best practices for defense against common threats. Studies have shown that their implementation provides an effective defense against the most common cyber attacks (~85%).

Created by the Center for Internet Security (CIS), a nonprofit that harnesses the power of a global IT community to safeguard public and private organizations against cyber threats, the CIS Controls are a significant first step for any organization that has to prioritize their cyber efforts due to limited resources.

 

Why are the CIS Controls critical among cyber teams and third-party risk teams?

Given there is no shortage of tools, standards, questionnaires, and frameworks available to support Third-Party Risk, many security teams struggle to put it all together. The CIS Controls provide clarity and help teams focus on what's most important, minimizing the risk of data breachesdata leaks, privacy loss, denial of service, and other cyber threats. CIS Controls help identify the attack vectors and guide you where you and your third parties can reduce your attack surface

Through the development of CIS Controls v7.1, your organization can more easily:

  • Create an effective cybersecurity program on a budget.
  • Practice cyber hygiene with limited resources and expertise.
  • Prioritize their cybersecurity efforts.
  • Implement security best practices, regardless of resources.

 

Learn how Whistic brings together industry-leading standards into a single source of truth, reducing business friction and speeding sales cycles. 

information security vendor security vendor risk management standards vendor security management CIS

About the author

Whistic
Whistic

The latest insights and updates on information security and third party risk management.

Still need our help? Our support team is waiting to help you.