Cybersecurity Tools & Guides
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.
Webinar Replay: Securing Agentic AI: Understand Its Potential and Risks in the Real World

PAM Implementation Playbook

Threat Intelligence Policy and Procedure
This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.

CISA SaaS Attacks Warning, Lumma Stealer Takedown, Hackers Claim Coca-Cola Breaches


Webinar Replay: Make the Case for Resources as Budgets Tighten in Healthcare

2025 Compensation and Budget for CISOs in Large Enterprises
Application Pen Test Program Framework
This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Zero Trust Maturity Model (ZTMM) Controls Guide




Incident Briefing: Coinbase Discloses Breach of Customer Data
On May 15, 2025, the cryptocurrency exchange Coinbase disclosed that it had been the victim of an extortion attempt following a breach of customer data. Coinbase stated that prior to receiving the extortion demand, it had independently discovered unauthorized access of customer data by “overseas support agents” using internal monitoring systems.
