Center for Internet Security

Who We Are

At CIS, we believe that everyone deserves a secure online experience. CIS harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. As a 501(c)(3) organization, CIS works to deliver confidence in the connected world. Our CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. We combine these best practices with timely cyber intelligence resources to help organizations worldwide start and stay secure.

The CIS Mission

  • Identify, develop, validate, promote, and sustain best practices in cybersecurity
  • deliver world-class security solutions to prevent and rapidly respond to cyber incidents
  • Build and lead communities to enable an environment of trust in cyberspace

Request more information via the association partnership portal at

Learn more about CIS at

What We Provide

Through our NCACC partnership, NC counties can obtain the following products and services from CIS:

CIS SecureSuite

Our suite of cybersecurity tools and services that leverage the CIS Benchmarks and CIS Controls to automate configuration assessment and provide enhanced insight for organizations of all sizes to improve their cybersecurity posture.

CIS CyberMarket

Our collaborative purchasing program offering U.S. state, local, tribal, and territorial (SLTT) governments, nonprofit entities, and public education and healthcare institutions improved cybersecurity through cost-effective group procurement. Through this program, members can obtain industry-leading cybersecurity products and services, such as:

  • End-User Security Awareness Training
  • Advanced Technical Training Courses & Certifications
  • Cyber Risk Management & Assessment Consulting Services
  • IT Asset & Security Configuration Management
  • Cloud Access Security Management

CIS Services

Security assessment and consulting services to help organizations start secure and stay secure. Our experts can identify critical system weaknesses with a customized plan designed to meet unique cybersecurity needs. Available services include:

  • Vulnerability Assessments
  • Network Monitoring & Analysis
  • Incident Response
  • Social Engineering and Phishing Exercises
  • External Network & Web Application Penetration Testing
  • Employee & Management Training Seminars