Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 53
Report Management and Leadership

2025 Guide to Hiring and Retaining CISOs and Security Leaders

With the risk of CISO attrition on the rise, it's essential to stay ahead of the curve. This guide, based on data from over 800 CISOs and insights from industry leaders, provides you with the tools and knowledge to ensure your organization remains secure and resilient.
IANS + Artico
Tools and Templates Networking

Ransomware Incident Response Playbook

Download this ransomware defense strategy checklist designed to help organizations more effectively prepare for and respond to ransomware events.

dave-shackleford
Dave Shackleford
Guide Risk Management

Prep for a Continued Uptick in Third-Party Risks in 2025

Third-party risks are expected to increase in 2025, as more organizations look to third parties to handle critical tasks, and hackers double down on disrupting supply chains.

This report details the main third-party risks to be aware of in 2025, as well as key areas security teams should invest in to improve their defenses and resilience to third-party compromise.

Steve Swick
Briefing Replay Management and Leadership

Incident Briefing: DeepSeek Disrupts the AI Market

Join IANS Faculty members Jake Williams and Summer Fowler as they dive into need-to-know implications of DeepSeek, a Chinese AI company that recently released a chatbot it claims rivals ChatGPT, but cost significantly less to develop.
jake-williams
Jake Williams
Summer Fowler
Report Management and Leadership

Key Security Budget Impacts for Financial Services in 2025

Download the full 2025 Security Budget Report for Financial Services

IANS + Artico
Report Governance, Risk Management and Compliance

IANS Security, Privacy and Compliance Law Update: Q3 2024

This Report provides updates on emerging international compliance laws and regulations that impact the information security and privacy communities.

Rebecca Herold, IANS Faculty
Tools and Templates Security Policies and Strategy

Checklist: RBAC Schema Assessment for GenAI Apps

Step three in a three-part series, this checklist breaks down factors for product owners to identify sensitive data, evaluate roles and map roles to data access.

jake-williams
Jake Williams
Tools and Templates Security Policies and Strategy

Checklist: Preparing Authentication for GenAI Apps

Step two in a three-part series, this checklist breaks down factors for ensuring your authentication methods for GenAI applications. Factors include the data the application processes as well as the cost to the organization to answer services.

jake-williams
Jake Williams
Tools and Templates Security Policies and Strategy

5 Key Steps to Mapping External Exposure of GenAI Applications

Step one in a three-part series, this template breaks down the process of assessing your external exposure from generative AI applications adopted by your organization.  

jake-williams
Jake Williams