All Blogs
Showing 226-234 of 373
Threats & Vulnerabilities
How to Harness the Power of Purple Teaming
April 12, 2022
Understand the prerequisites, roles and responsibilities, as well as best practices for conducting effective purple team exercises.
IANS Faculty
Threats & Vulnerabilities
Purple Team Exercise Readiness Checklist
April 7, 2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.
IANS Faculty
Threats & Vulnerabilities
Threat Hunting 101: Understand the Basics
April 5, 2022
Learn how to improve internal hunting capabilities, while keeping investment costs down, by understanding the foundational elements of a sound threat hunting program.
IANS Faculty
Threats & Vulnerabilities
Best Practices for Building Effective Purple Team Exercises
March 31, 2022
Understand what a purple team exercise is and learn important steps for creating effective purple team exercises that strengthen your security program.
IANS Faculty
Managing Vendors and Third Parties
Building a Third-Party Risk Management Checklist
March 29, 2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
IANS Faculty
Managing Vendors and Third Parties
How to Build a Third-Party Risk Management Framework
March 24, 2022
Learn the steps information security teams must take to build a solid third-party risk management framework that mitigates organizational third-party risk.
IANS Faculty
Threats & Vulnerabilities
How to Formalize Your Vulnerability Management Program
March 22, 2022
Identify the key areas to consider when formalizing a vulnerability management program. Find guidance on standards, policies and procedures; vulnerability lifecycle management; operating system patching; and communication with stakeholders to ensure your security team gets it right.
IANS Faculty
Management and Leadership
Third-Party Risk Management: Guidance for InfoSec Teams
March 17, 2022
Learn the steps information security teams and organizations must take to build an effective third-party risk management process that mitigates organizational risk.
IANS Faculty
Threats & Vulnerabilities
How to Track Phishing Resilience Using a Metrics Matrix
March 10, 2022
Learn how to build an organizational phishing metrics matrix to better gauge organizational resilience, identify areas of concern to strengthen your security awareness program.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.