{"id":4485,"date":"2024-08-14T15:14:15","date_gmt":"2024-08-14T15:14:15","guid":{"rendered":"https:\/\/www.pax8.com\/blog\/?p=4485"},"modified":"2024-08-16T13:32:24","modified_gmt":"2024-08-16T13:32:24","slug":"community-based-cis-handbook","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/","title":{"rendered":"Two new ways to sell more cybersecurity: CIS Controls Handbook and the Pax8 Marketplace"},"content":{"rendered":"<p>At Pax8, we take cybersecurity seriously. This is why we recommend our managed service provider (MSP) partners implement the <a href=\"https:\/\/www.pax8.com\/blog\/implementing-cis-controls\/\" target=\"_blank\" rel=\"noopener\">CIS Security Controls<\/a>, a global framework with broad, yet simplified best practices for cybersecurity. But while the basics laid out by the CIS Controls offer plenty to chew on for MSPs looking to bolster their clients\u2019 cybersecurity, putting each of the 18 Controls and their safeguards into place is much easier said than done.<\/p>\n<p>What we discovered in our research was that there wasn\u2019t a single source of truth out there that explored each of the CIS Controls and how to effectively evaluate each of their components. We knew that for our partners to take full advantage of this framework, they needed to understand its nuance, context, and definitions clearly. That\u2019s why we worked with our partners and CIS directly to develop the \u201c<a href=\"https:\/\/pages.pax8.com\/cis-handbook-us.html\" target=\"_blank\" rel=\"noopener\">CIS Controls Handbook: A Visual Guide to Evaluating Cybersecurity<\/a>.\u201d This comprehensive, proprietary resource offers visualizations for each Control and sub-Control so MSPs know the ins and outs of each and how they can begin to plan for implementation. Read on to learn how we made this mammoth endeavor happen.<\/p>\n<h2>Bringing together the MSP community<\/h2>\n<p>We started by engaging the <a href=\"https:\/\/www.cisecurity.org\/\" target=\"_blank\" rel=\"noopener\">Center for Internet Security\u00ae<\/a> (CIS) itself. CIS is a global, community-driven nonprofit that works with individuals in the IT and cybersecurity industry to develop benchmarks for preventing and mitigating cyber threats.<\/p>\n<p>With this foundation in place, we sought and received input from more than 30 contributors spanning from IT professionals implementing cybersecurity measures to developers creating the products needed. With the help of our partners, we were able to learn more from those on the ground \u2014 what they did, what worked, and what their best practices were when it came to implementing CIS Controls.<\/p>\n<h2>Our purpose<\/h2>\n<p>The purpose behind creating this visual handbook was to develop the go-to guide to assist security professionals in navigating how to align their cybersecurity stack with the CIS Critical Controls and Safeguards. To design this clear and actionable guide, we worked with our collaborators to create visual representations of each safeguard\u2019s language broken down into specific taxonomical elements. Because this framework is dense, developing a visual tool ensures a digestible way for MSPs to understand how the 153 safeguards that make up the CIS Controls interconnect.<\/p>\n<p>Furthermore, these visual mappings offer security teams an effective way to evaluate their understanding of the breadth and depth of each safeguard, identify knowledge and coverage gaps, and plan accordingly. While software vendors may find the guide useful to align their products and service features with the CIS Controls, our primary focus is supporting security teams in strengthening their preventative security measures.<\/p>\n<h2>Behind the methodology<\/h2>\n<p>The handbook was born from an initiative to use the Controls\u2019 taxonomical elements to create a questionnaire that classified each vendor\u2019s products and services into the safeguards they serve. This involved creating a detailed evaluation criterion, including technical components and vendor attestation methods, to ensure that each solution provided comprehensive coverage for its corresponding safeguard. The result? We were able to classify and sort solutions that help MSPs and the organizations they serve meet each of the CIS Controls. Many of these solutions are available to provision in the <a href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/\" target=\"_blank\" rel=\"noopener\">Pax8 Marketplace<\/a>.<\/p>\n<h2>How to use this document<\/h2>\n<p>This visual guide is not meant to replace the CIS Control guidelines; rather, it\u2019s meant to bolster the great work CIS is already doing. It&#8217;s helpful to first get acquainted with the CIS Controls, CIS Implementation Groups, CIS Benchmarks, and the broader CIS body of work. The guide also assumes a baseline knowledge of security principles. If you don\u2019t feel you have a solid grounding in this framework, our courses in <a href=\"https:\/\/www.pax8.com\/en-us\/academy\/\" target=\"_blank\" rel=\"noopener\">Pax8 Academy<\/a> can get you up to speed.<\/p>\n<p>For an idea of how each of the Controls is mapped out, view the chart below:<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-4534 size-large\" src=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards-1024x593.png\" alt=\"\" width=\"1024\" height=\"593\" srcset=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards-1024x593.png 1024w, https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards-300x174.png 300w, https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards-768x445.png 768w, https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards-1536x890.png 1536w, https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/07\/cis-controls-tools-safeguards.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Also, you can watch our <a href=\"https:\/\/www.youtube.com\/watch?v=n0MKnyFTtEM&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\">video walkthrough<\/a> to get started.<\/p>\n<h2>How Pax8 is implementing this work into the Pax8 Marketplace<\/h2>\n<p>The substantial work we have done with the community around this project doesn\u2019t stop at a handbook. We\u2019ve taken the knowledge gleaned from our research and built it right back into the Pax8 Marketplace.<\/p>\n<p>Now, our partners have access to a new feature called <a href=\"https:\/\/www.pax8.com\/blog\/new-pax8-marketplace\/\" target=\"_blank\" rel=\"noopener\">Opportunity Explorer<\/a>.<\/p>\n<h3>What is Opportunity Explorer?<\/h3>\n<p>Unveiled at this year\u2019s Pax8 Beyond, this feature leverages data to pinpoint and answer customer needs, offering actionable data insights for partners to provide tailored recommendations and identify sales opportunities. Opportunity Explorer was designed with the power of machine learning and data-driven insights and was built on the wisdom of our 35,000+ partners to help MSPs identify gaps in coverage and capitalize on sales opportunities. Partners can search, filter, and sort opportunities in a completely reimagined user interface.<\/p>\n<p>Here\u2019s just some of what this feature can do:<\/p>\n<ul>\n<li>Highlight seat and product gaps<\/li>\n<li>Identify coverage vulnerabilities<\/li>\n<li>Search, sort, and filter based on customers\u2019 needs<\/li>\n<li>Discover upsell\/cross-sell opportunities<\/li>\n<li>Recommend actionable, data-driven insights<\/li>\n<li>Illuminate untapped revenue streams<\/li>\n<\/ul>\n<h3>How does Opportunity Explorer help partners and their clients strengthen their security postures?<\/h3>\n<p>Here\u2019s what\u2019s so great about Opportunity Explorer: It\u2019s not just a way to earn more revenue from your clients; it\u2019s a way to serve them better, with tailored security recommendations. Using best-in-industry security packages and CIS version 8, Opportunity Explorer shows you which of your customers may have security gaps and where, so you can engage those clients in a discussion around security.<\/p>\n<h2>Getting started with our CIS Controls Handbook and Opportunity Explorer<\/h2>\n<p>Together, our new handbook and the improvements we\u2019ve made to the <a href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/\" target=\"_blank\" rel=\"noopener\">Pax8 Marketplace<\/a> help you better serve your clients with improved cybersecurity measures while generating new revenue opportunities for your business. <a href=\"https:\/\/app.pax8.com\/\" target=\"_blank\" rel=\"noopener\">Log into the Pax8 Marketplace<\/a> to give Opportunity Explorer a spin and <a href=\"https:\/\/pages.pax8.com\/cis-handbook-us.html\" target=\"_blank\" rel=\"noopener\">download our CIS Controls handbook<\/a> to tap into the collective knowledge of our partners and create a successful cybersecurity strategy for your clients.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/pages.pax8.com\/cis-handbook-us.html\" target=\"_blank\" rel=\"noopener\">Get the CIS Controls Handbook<\/a><\/p>\n<h2>Thanks to all the contributors to \u201cCIS Controls Handbook: A Visual Guide to Evaluating Cybersecurity\u201d<\/h2>\n<p>This publication is a result of a collaborative effort between Pax8, CIS, and a diverse group of industry leaders that span from practitioners to developers. Special thanks to our facilitators at the MSPs Global Data Systems and Blue Helm Technology.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/cybermattlee\/\" target=\"_blank\" rel=\"noopener\">Matt Lee, Senior Director of Security and Compliance, Pax8<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/dombayeva\/\" target=\"_blank\" rel=\"noopener\">Veronika Dombayeva, Vendor Strategy Analyst, Pax8<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/charity-otwell-cbcp-cisa-cgeit-itil-7a5830bb\/\" target=\"_blank\" rel=\"noopener\">Charity Otwell, Director, Critical Security Controls, Center for Internet Security<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/joshuamichaelfranklin\/\" target=\"_blank\" rel=\"noopener\">Joshua Franklin, Senior Cybersecurity Engineer, Center for Internet Security<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/robertdmiller\/\" target=\"_blank\" rel=\"noopener\">Bob Miller, Global Data Systems<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/stephenkellogg\/\" target=\"_blank\" rel=\"noopener\">Stephen Kellogg, Blue Helm Technology<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/alexander-dumas-0b228932\/\" target=\"_blank\" rel=\"noopener\">Alex Dumas, Ember One<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/andylarin\/\" target=\"_blank\" rel=\"noopener\">Andy Larin, allCare IT<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/etopbrandon\/\" target=\"_blank\" rel=\"noopener\">Brandon Martinez, ZenTop Consulting<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/brendantpatterson\/\" target=\"_blank\" rel=\"noopener\">Brendan Patterson, Watchguard<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/chrisjohnson1337msp\/\" target=\"_blank\" rel=\"noopener\">Chris Johnson, CompTIA<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/danbrinkmann\/\" target=\"_blank\" rel=\"noopener\">Dan Brinkmann, Summit Technology, LLC<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/danny-banks-730862159\/\" target=\"_blank\" rel=\"noopener\">Danny Banks, Watchguard<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/dawn-sizer\/\" target=\"_blank\" rel=\"noopener\">Dawn R. Sizer, 3rd Element Consulting<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/rep4tech\/\" target=\"_blank\" rel=\"noopener\">Eddie Phillips, Malwarebytes<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/maria-scarmardo\/\" target=\"_blank\" rel=\"noopener\">Maria Scarmardo, Praxis Data Security<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/evangrace\/\" target=\"_blank\" rel=\"noopener\">Evan Grace, Tenable<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/heath-spencer\/\" target=\"_blank\" rel=\"noopener\">Heath Spencer, TraitWare<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/henrytimm\/\" target=\"_blank\" rel=\"noopener\">Henry Timm, Phantom Technology Solutions<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/skinnerjack\/\" target=\"_blank\" rel=\"noopener\">Jack Skinner, Oversee My IT<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/jclark0516\/\" target=\"_blank\" rel=\"noopener\">Jordan Clark, CW IT Support<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/karenstanford\/\" target=\"_blank\" rel=\"noopener\">Karen Stanford, Archstone Security<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/kenbrothers\/\" target=\"_blank\" rel=\"noopener\">Kenneth Brothers, Information Security Risk Management<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/marc-menzies-cissp\/\" target=\"_blank\" rel=\"noopener\">Marc P. Menzies, Overview Technology Solutions<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/tommy-takiari-261427a\/\" target=\"_blank\" rel=\"noopener\">Tommy Takiari, CorCyber<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/securityzachkromkowski\/\">Zach Kromkowski, Senteon<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/martinjperkins\/\" target=\"_blank\" rel=\"noopener\">Martin Perkins, Ki Security and Compliance Group<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/heathernoggle\/\" target=\"_blank\" rel=\"noopener\">Heather Noggle, Codistac<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/robert-ellis-846435237\/\" target=\"_blank\" rel=\"noopener\">Robert Ellis, Akana<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/rui-lopes-6966161\/\" target=\"_blank\" rel=\"noopener\">Rui Lopes, Check Point<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/teddyguzek\/\" target=\"_blank\" rel=\"noopener\">Teddy Guzek, Shield Cyber<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/timothygolden\/\" target=\"_blank\" rel=\"noopener\">Tim Golden, Compliance Scorecard<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/timschnurr\/\" target=\"_blank\" rel=\"noopener\">Tim Schnurr, Inquisitive IT<\/a><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/todd-sieger-95a6356\/\" target=\"_blank\" rel=\"noopener\">Todd Sieger, Pax8<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about our vast collaboration with CIS and security professionals to develop a new guide on understanding the CIS Controls as well as a universal standard for improving MSP selling opportunities.<\/p>\n","protected":false},"author":171,"featured_media":4601,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,85,5],"tags":[],"class_list":["post-4485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-reduce-risk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Pax8 and partners created CIS booklet | Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Discover how to leverage the CIS Critical Security Controls with our new Pax8 guide so that you improve your revenue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All about our new CIS guide and Marketplace improvements\" \/>\n<meta property=\"og:description\" content=\"Learn about what into our new guide on implementing the CIS Critical Security Controls as well as revenue-generating improvements to the Pax8 Marketplace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-14T15:14:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-16T13:32:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pmysliviec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"All about our new CIS guide and Marketplace improvements\" \/>\n<meta name=\"twitter:description\" content=\"Learn about what into our new guide on implementing the CIS Critical Security Controls as well as revenue-generating improvements to the Pax8 Marketplace.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pmysliviec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/\"},\"author\":{\"name\":\"pmysliviec\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\"},\"headline\":\"Two new ways to sell more cybersecurity: CIS Controls Handbook and the Pax8 Marketplace\",\"datePublished\":\"2024-08-14T15:14:15+00:00\",\"dateModified\":\"2024-08-16T13:32:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/\"},\"wordCount\":1220,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/08\\\/cis-controls-mapping-opportunity-explorer-security.jpg\",\"articleSection\":[\"MSPs\",\"Reduce risk\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/\",\"name\":\"How Pax8 and partners created CIS booklet | Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/08\\\/cis-controls-mapping-opportunity-explorer-security.jpg\",\"datePublished\":\"2024-08-14T15:14:15+00:00\",\"dateModified\":\"2024-08-16T13:32:24+00:00\",\"description\":\"Discover how to leverage the CIS Critical Security Controls with our new Pax8 guide so that you improve your revenue.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/08\\\/cis-controls-mapping-opportunity-explorer-security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/08\\\/cis-controls-mapping-opportunity-explorer-security.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/community-based-cis-handbook\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two new ways to sell more cybersecurity: CIS Controls Handbook and the Pax8 Marketplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\",\"name\":\"pmysliviec\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/pmysliviec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Pax8 and partners created CIS booklet | Pax8 Blog","description":"Discover how to leverage the CIS Critical Security Controls with our new Pax8 guide so that you improve your revenue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/","og_locale":"en_US","og_type":"article","og_title":"All about our new CIS guide and Marketplace improvements","og_description":"Learn about what into our new guide on implementing the CIS Critical Security Controls as well as revenue-generating improvements to the Pax8 Marketplace.","og_url":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/","og_site_name":"Pax8 Blog","article_published_time":"2024-08-14T15:14:15+00:00","article_modified_time":"2024-08-16T13:32:24+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","type":"image\/jpeg"}],"author":"pmysliviec","twitter_card":"summary_large_image","twitter_title":"All about our new CIS guide and Marketplace improvements","twitter_description":"Learn about what into our new guide on implementing the CIS Critical Security Controls as well as revenue-generating improvements to the Pax8 Marketplace.","twitter_image":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","twitter_misc":{"Written by":"pmysliviec","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/"},"author":{"name":"pmysliviec","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8"},"headline":"Two new ways to sell more cybersecurity: CIS Controls Handbook and the Pax8 Marketplace","datePublished":"2024-08-14T15:14:15+00:00","dateModified":"2024-08-16T13:32:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/"},"wordCount":1220,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","articleSection":["MSPs","Reduce risk","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/","url":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/","name":"How Pax8 and partners created CIS booklet | Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","datePublished":"2024-08-14T15:14:15+00:00","dateModified":"2024-08-16T13:32:24+00:00","description":"Discover how to leverage the CIS Critical Security Controls with our new Pax8 guide so that you improve your revenue.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/08\/cis-controls-mapping-opportunity-explorer-security.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/community-based-cis-handbook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Two new ways to sell more cybersecurity: CIS Controls Handbook and the Pax8 Marketplace"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8","name":"pmysliviec","url":"https:\/\/www.pax8.com\/blog\/author\/pmysliviec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=4485"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4485\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/4601"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=4485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=4485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=4485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}