News & Blogs

Showing 46-54 of 442
Threats & Vulnerabilities

How to Prevent and Mitigate Social Engineering Attacks

May 31, 2022
Find best practices to prevent social engineering attacks along with mitigation tactics as part of a sound risk mitigation strategy.
IANS Faculty
Incident Response & Recovery

6 Key Phases of an Effective Global Threat Response Playbook

May 24, 2022
Guidance on how to create a global threat response playbook tailored to the unique circumstances and capabilities of your organization.
IANS Faculty
Management and Leadership

How to Make Tangible Progress with Zero Trust

May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
IANS Faculty
Governance, Risk Management & Compliance

Key Features to Look for in a GRC Tool

May 10, 2022
Considering implementing a GRC tool? Learn the main features to look for when evaluating a GRC tool.
IANS Faculty
Threats & Vulnerabilities

Purple Team Exercise Readiness Checklist

April 7, 2022
Find guidelines on key prerequisites to ensure organizations are fully prepared to participate in purple team exercises.
IANS Faculty
Managing Vendors and Third Parties

How to Build a Third-Party Risk Management Framework

March 24, 2022
Learn the steps information security teams must take to build a solid third-party risk management framework that mitigates organizational third-party risk.
IANS Faculty
Threats & Vulnerabilities

How to Formalize Your Vulnerability Management Program

March 22, 2022
Identify the key areas to consider when formalizing a vulnerability management program. Find guidance on standards, policies and procedures; vulnerability lifecycle management; operating system patching; and communication with stakeholders to ensure your security team gets it right.
IANS Faculty
Management and Leadership

Third-Party Risk Management: Guidance for InfoSec Teams

March 17, 2022
Learn the steps information security teams and organizations must take to build an effective third-party risk management process that mitigates organizational risk.
IANS Faculty
Threats & Vulnerabilities

Ransomware: Prevention and Response Tactics

March 8, 2022
Find guidance for security teams on how to try and prevent a ransomware attack along with tactics on how to respond should your organization fall victim to an attack.
IANS Faculty