InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Operating in a space wrought with innumerable risks and increasingly sophisticated attackers, no one single information security practitioner is expected to know what to expect at all times and how to respond to any given event. Which is why having a trusted resource to rely on for advice is key.
Our team of Faculty serve as that resource.
Through their direct interactions with our clients as part of our Ask-An-Expert service, our Faculty members are attuned to the top concerns of security practitioners. Unsurprisingly, ransomware has emerged as an area of particular interest where security leaders and their teams often engage our Faculty for guidance.
If you're unsure about how your organization might respond to a ransomware attack, you're not alone. In this piece we provide insight into what other security teams want to know about how to respond to ransomware attacks based on the questions they ask to our Faculty.
Even with an established ransomware prevention strategy in place, the potential for a successful ransomware attack remains. In the event your organization is faced with a severe incident, knowing how to respond is vital to recovery - as is evident in the following questions security teams posed to our Faculty.
READ: What Security Teams Want to Know About Ransomware Prevention
As part of our Ask-An-Expert service, questions like those in the ransomware response realm featured here are personally addressed by a dedicated member of our Faculty, whether through a phone conversation or detailed written response. Accessibility to our Faculty is unlimited and can vary in scope to address the specific needs for a particular security project or program.
Do you have questions about a particular security project or program initiative? Get in touch with IANS to learn more about how our Faculty can serve as a clear-headed resource to help you and your team.
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
December 8, 2022
By IANS Faculty
Find best practices for ensuring the security of your organization’s OT environment using this checklist based on the Purdue Reference Model for industrial control network segmentation.
December 6, 2022
By IANS Research
Improve your attack surface management plan using 9 steps to mitigate risk and strengthen enterprise security posture.
December 1, 2022
Improve your vendor management program using six focus areas to benchmark program maturity and identify key pitfalls to avoid.