InfoSec-Specific Executive Development for CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive labs to build you and your team's InfoSec skills
As organizations shift back to in-person working arrangements, it’s important that security teams make plans to perform vulnerability assessments and endpoint analyses, update security awareness and employee training, and revisit remote access and
authentication/authorization models and tools in use. In this piece we outline the key steps to take and pain points to watch when returning to in-office work after the pandemic.
When planning a company’s transition back to an in-person working environment, security teams should focus on several key issues. Based on many conversations with other clients and industry professionals, we outline five key steps security teams
should consider focusing on as they return to the office following the pandemic.
Security teams can expect several possible pain points when migrating back to office work environments:
All security teams should start planning now for the changes that will occur when organizations come back to the office. Some are short-term, and others will take longer. Keep these important initiatives in mind:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
October 19, 2021
By IANS Faculty
Continuous compliance requires continuous monitoring and validation of controls in the environment, as well as integration with governance, risk management and compliance tools and platforms. Understand the processes, tools, stakeholders and focus required for a best practice continuous compliance program.
October 14, 2021
Learn how the DDoS threat is evolving and get a step-by-step playbook to ensure your organization is protected against DDoS attacks and has a response plan in place.
October 12, 2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.