Content Type
Date Range
Tools & Guides | Oct/22/2024

Step two in a three-part series, this checklist breaks down factors for ensuring your authentication methods for GenAI applications. Factors include the data the application processes as well as the cost to the organization to answer services.

Blog | Oct/2/2024
Access key data sets from the annual IANS and Artico CISO Compensation Benchmark Report. Find latest market trends on CISO comp increases and the drivers behind them.
Page
IANS Research provides guidance and actionable advice from renowned information security practitioners to help CISOs and their teams make informed decisions.
Page
Resources to bolster your security program standing with the board of your organization.
Page
Security Talent Management Resources
Event | Oct/31/2024
In today’s ever-evolving threat landscape, ensuring a strong security posture while meeting annual compliance regulations has never been more important. As organizations work to protect their data and systems, they must meet compliance standards such as ISO 27001, PCI DSS, and SOC Type 2. Traditionally, penetration testing (pen testing) has been the go-to method for assessing security posture, but it has its limitations. Enter Purple Team Exercises (PTE) – a more comprehensive and collaborative approach to cybersecurity testing.
Tools & Guides | Sep/18/2024

Step one in a three-part series, this template breaks down the process of assessing your external exposure from generative AI applications adopted by your organization.