InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
This is the second piece in our CISO Questions series, where we highlight questions CISOs and other information security leaders pose to our Faculty members through our Ask-An-Expert service. Here we share questions related to compliance, tools/technology
and identity and access management (IAM).
As information security practitioners who have "seen it and done it," our Faculty are well-positioned to field technical questions from CISOs requiring them to get deep in the weeds. Examples of the types of technical, security tool-related inquiries CISOs rely
on the Faculty for guidance include:
Navigating complex compliance waters can be a challenge for even the most seasoned CISOs, given industry requirements, as well as state and domestic/international variance. Our 80-plus Faculty members cover every vertical and assist clients with:
IAM is growing in importance and complexity, as more organizations move critical workloads to the cloud and need to implement IAM programs that effectively support on-prem, cloud and hybrid work environments. Some questions security leaders asked in the
DOWNLOAD: 5 Attributes of Top-Performing CISOs
CISOs and their teams posing questions receive either a detailed and action-oriented 1,000-word written report or participate in a one-hour phone call in response to all Ask-An-Expert questions.
The service, which is part of our flagship offering, gives CISOs and their teams the opportunity to submit an unlimited number of questions to an InfoSec practitioner with deep domain-level expertise.
Get in Touch with IANS to learn more about how you and your security team can benefit from an Ask-An-Expert engagement.
May 19, 2022
By IANS Faculty
Understand potential security risks for executives on social media. Find information on attack trends and guidelines to help identify potential attacks and keep both social media accounts and the organization secure.
May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
May 12, 2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.