Skip to main content
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC
MassCyberCenter Logo
  • About
    • Overview
    • Strategy Council
    • Ecosystem
    • Team
    • News
    • Newsletters
    • Events
    • Add an Event
    • Past Events
    • Contact
  • Programs & Grants
    • Cyber Resilient MA Grant
    • ACE Talent Grant
    • Mentorship Program
    • SOC RFP
    • Health Care
  • Municipalities
    • Cyber Resilient Massachusetts
    • Cyber Resilient Massachusetts Working Group
    • Minimum Baseline for Municipalities
    • CyberSecure Deck
    • SOC Range Initiative
    • Resources
  • Small Business/Non-Profit
    • Minimum Baseline for Small Businesses
    • CyberSecure Deck
    • Cyber Resilient MA Grant
    • SOC Range Initiative
    • Resources
  • Workforce Development
    • Jobs Board
    • Cybersecurity Training & Education Working Group
    • ACE Talent Grant
    • SOC Range Initiative
    • Mentorship Program
    • Workforce Development Resources
  • Get Involved
  • MassTech
  • Broadband
  • Cyber
  • eHealth
  • Innovation
  • Manufacturing
  • NEMC

Search

Breadcrumb

  1. Home
  2. Know Your Threats

Know Your Threats

Establish and maintain a security awareness program. The purpose of a security awareness program is to educate the enterprise's workforce on how to interact with enterprise assets and data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and update content annually, or when significant enterprise changes occur that could impact this Safeguard.

Applicable Controls

CIS ControlCIS SafeguardAsset TypeSecurity FunctionTitleDescription

14

14.1

N/A

Protect

Establish and Maintain a Security Awareness ProgramEstablish and maintain a security awareness program. The purpose of a security awareness program is to educate the enterprise’s workforce on how to interact with enterprise assets and data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and update content annually, or when significant enterprise changes occur that could impact this Safeguard.

Policy Templates for Security Controls

Enterprise Asset Management Policy Template for CIS Control 1
This template can assist an enterprise in developing an enterprise asset management policy.
Download the template

Software Asset Management Policy Template for CIS Control 2
This template can assist an enterprise in developing a software asset management policy.
Download the template

Data Management Policy Template for CIS Control 3
This template can assist an enterprise in developing a data management policy.
Download the template

Account and Credential Management Policy Template for CIS Controls 5 and 6
This template can assist an enterprise in developing an account and credential management policy.
Download the template

Service Provider Management Policy Template for CIS Control 15
This template can assist an enterprise in developing a service provider management policy.
Download the template

Public and Non-profit Tools

Massachusetts State Police | Commonwealth Fusion Center Massachusetts Cybersecurity Program (MCP)
The MCP works closely with federal, state, local, and private sector agencies to establish effective communications and relationships and provide cybersecurity threat reporting, training, education, and awareness to Massachusetts organizations.
Email: mcppol@pol.state.ma.us

CIS & MS-ISAC Malicious Doman Blocking and Reporting (MDBR) Service
Free service for MS-ISAC members: implements recursive Domain Name Service (DNS) technology that prevents IT systems from connecting to harmful web domains. This limits infections related to known malware, ransomware, phishing, and other threats.

NSA DIB Cybersecurity Services – Protective DNS - NSA offers no-cost cybersecurity services to any company that contracts with DoD (sub or prime) or has access to non-public DoD information. Protective DNS (PDNS) is a DNS filter which blocks users from connecting to malicious or suspicious domains. To date, NSA’s PDNS program has blocked 1 billion malicious or suspicious domains, including nation-state spearphishing, malware, botnets, and ransomware activity.

National Security Agency - Threat Intelligence Collaboration
NSA offers no-cost cybersecurity services to any company that contracts with DoD (sub or prime) or has access to non-public DoD information. Enter into a voluntary, mutually beneficial cyber threat information sharing relationship with the NSA. They will establish a secure collaboration channel with your cyber threat analysts and share non-public, DIB-specific threat intelligence to help you prevent, detect, and mitigate malicious cyber activity. This channel is also a way for your team to submit questions and feedback on findings related to the threat intelligence directly back to NSA.

LevelBLue - Gain FREE access to over 20 million threat indicators contributed daily. Collaborate with over 200,000 global participants to investigate emerging threats in the wild. Automatically extract IOCs from blogs, threat reports, emails, PCAPs, and more. Submit files and URLs for free malware analysis within LevelBlue Labs OTX sandbox.

Form
Get MassCyberCenter news from the Massachusetts Technology Collaborative in your inbox.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
By submitting this form, you are consenting to receive marketing emails from: Massachusetts Technology Collaborative, 75 North Drive, Westborough, MA, 01581, US, https://www.masstech.org.

No thanks, please take me to the website. 

MassCyberCenter Logo

Sign Up for Our Newsletter

  • Contact
  • Procurement
  • Public Notices
  • Privacy Policy
  • Accessibility

Main Campus:
75 North Drive
Westborough, MA 01581
(508) 870-0312

Boston Office:
2 Center Plaza, Suite 200
Boston, MA 02108
(617) 371-3999

  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)
  • Visit our page (opens in new tab)

Privacy Policy Accessibility © 2024 Massachusetts Technology Collaborative