Make cyber decisions faster
Supporting your cyber projects
Developing yourself and your team
Learn from industry leaders
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.
Step two in a three-part series, this checklist breaks down factors for ensuring your authentication methods for GenAI applications. Factors include the data the application processes as well as the cost to the organization to answer services.
Step three in a three-part series, this checklist breaks down factors for product owners to identify sensitive data, evaluate roles and map roles to data access.
Step one in a three-part series, this template breaks down the process of assessing your external exposure from generative AI applications adopted by your organization.
IANS and Artico Search surveyed more than 660 CISOs as part of the 2023 CISO Compensation and Budget Survey. Retaining and Hiring CISOs and Security Leaders in 2024 compiles the findings of that survey into key data points that hiring leaders should keep in mind during the recruitment process.
This report explains the key ingredients of an effective executive-level dashboard and offers tips for building one.
In this quarterly research report, IANS updates you on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.
The financial effects of a data breach can range from losses due to business disruption and data exposure to regulatory fines, brand impacts and legal costs. This report highlights some recent statistics on breach costs and provides a process for determining breach costs specific to your organization.
Identifying top-tier talent and ensuring their advancement through coaching, development and promotion is essential to building a mature security organization. This report explores the various criteria that demonstrates whether an individual is ready for promotion or advancement.
This Report presents a different way to do two-dimensional analysis that aims to help you contextualize your decision to your specific environment/needs to help you determine which vendors work best in certain types of companies and technology environments.
This Guide breaks the classic+ approach to vendor management, enabling your organization to draw from the benefits of the classic and modern approach that is less likely to trigger objections and concerns from others.
Use this playbook to help your organization assess and mitigate impact in the event of a third-party vendor ransomware incident.
In this Third Party Risk Management (TPRM) Guide, IANS breaks down the current state of the TPRM market to provide relevant recommendations for organizations looking to invest in a solution this year.
Creating metrics to support budgeting and decision-making requires a focus on threats, losses and return on controls (ROC). This report explains how to use a cyber-risk quantification (CRQ) process to create metrics that resonate with the board and senior leadership.
This checklist provides a streamlined list of requirements that take effect 30 days following publication of the adopting release in the Federal Register, allowing organizations to quickly assess any gaps that need to be addressed.
This Report provides updates on emerging international compliance laws and regulations that impact the information security and privacy communities.
This template is designed to help establish a workable data protection and classification policy in general, as well as to support PCI DSS compliance.
Find best practices to help create and govern your organization’s policy on acceptable generative AI use cases.
Identify and learn about the top risks of AI tools and find recommendations on how to mitigate those risks.
This benchmark report serves to help CISOs in Canada better assess their situations against those of their peers with country-specific data and analysis charting comp, security budgets and satisfaction levels.
This webinar replay, led by IANS Faculty Ed Skoudis, is ideal for anyone looking to learn more about how to maximize their upcoming pen testing efforts, and where IANS can play a role in that..
In this Report, IANS Faculty define core processes, providing a comprehensive program description and enabling room to outline future goals.
This benchmark report serves to help CISOs in the tech sector better assess their situations against those of their peers. It offers breakouts for key subsectors, specifically, software, hardware and infrastructure, financial technology (fintech), healthcare tech, and cybersecurity vendors.
This report explains how a program that includes policy, technology, training, exercises and third-party validation can be an effective defense against both phishing and ransomware.
This report contains firsthand experiences from a dozen IANS clients can shed light on how to best proceed with Microsoft 365 Copilot.
This webinar breaks down the security implications you need to be aware of and responsible options for MS Copilot usage should you choose to deploy it.
This report explains some measures that can be taken to minimize the risk of AI use, abuse and accidents impacting reputation or revenue.
This template serves as a baseline breakdown of security, it’s role within your organization, and steps employees should take to ensure they aren’t exposing your organization to unnecessary risk.
Understand the main issues with AI, along with common business use cases and recommendations for protecting the organization when using each.
Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.
Learn how to create IR metrics that focus on improvement and resonate with management using our 'Create Incident Response Metrics Worth Reporting' guide.
Help better prepare your organization for potential cyberattacks using these 8 tabletop scenario templates.
Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.
Find a timesaving checklist that details the GRC tasks commonly implemented at most organizations.
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Use our Ransomware Prep Toolkit from IANS Faculty, Dave Shackleford to prepare and respond to ransomware incidents quickly and effectively.
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Use our Data Protection and Classification Policy developed by IANS Faculty member, Kelli Tarala as a workable template to establish data protection and compliance standards for your organization.
Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.
Use this timesaving checklist that details best practices to follow, and pitfalls to avoid ensuring DevSecOps success.