Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 48
Tools and Templates Security Policies and Strategy

Checklist: RBAC Schema Assessment for GenAI Apps

Step three in a three-part series, this checklist breaks down factors for product owners to identify sensitive data, evaluate roles and map roles to data access.

jake-williams
Jake Williams
Tools and Templates Security Policies and Strategy

Checklist: Preparing Authentication for GenAI Apps

Step two in a three-part series, this checklist breaks down factors for ensuring your authentication methods for GenAI applications. Factors include the data the application processes as well as the cost to the organization to answer services.

jake-williams
Jake Williams
Tools and Templates Security Policies and Strategy

5 Key Steps to Mapping External Exposure of GenAI Applications

Step one in a three-part series, this template breaks down the process of assessing your external exposure from generative AI applications adopted by your organization.  

jake-williams
Jake Williams
Report Team Structure and Management

Retaining and Hiring CISOs and Security Leaders in 2024

IANS and Artico Search surveyed more than 660 CISOs as part of the 2023 CISO Compensation and Budget Survey. Retaining and Hiring CISOs and Security Leaders in 2024 compiles the findings of that survey into key data points that hiring leaders should keep in mind during the recruitment process.

mike-saurbaugh
Mike Saurbaugh
Report Metrics and Reporting

Tips for Creating Effective Executive Dashboards

This report explains the key ingredients of an effective executive-level dashboard and offers tips for building one.

mike-saurbaugh
Mike Saurbaugh
Report Vulnerability Assessment and Management

IANS Vulnerability and Breach Update: Q2 2024

In this quarterly research report, IANS updates you on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

mike-saurbaugh
Mike Saurbaugh
Report Vendor Management

Develop and Promote Internal Talent To Senior Infosec Roles

Identifying top-tier talent and ensuring their advancement through coaching, development and promotion is essential to building a mature security organization. This report explores the various criteria that demonstrates whether an individual is ready for promotion or advancement.

Anand Singh, IANS Faculty
Tools and Templates Governance, Risk Management and Compliance

Create Metrics To Use for Budgeting and Decision-Making

Creating metrics to support budgeting and decision-making requires a focus on threats, losses and return on controls (ROC). This report explains how to use a cyber-risk quantification (CRQ) process to create metrics that resonate with the board and senior leadership.


Richard Seiersen, IANS Faculty
Tools and Templates Governance, Risk Management and Compliance

Determine the Cost and Impact of a Security Breach

The financial effects of a data breach can range from losses due to business disruption and data exposure to regulatory fines, brand impacts and legal costs. This report highlights some recent statistics on breach costs and provides a process for determining breach costs specific to your organization.


Mike Saurbaugh, IANS Faculty