InfoSec Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.

Report icon
Report

Management and Leadership

Executive Competencies for InfoSec Leaders

by IANS Research

Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.

See Details
Guide icon
Guide

Threats and Vulnerabilities

Essential Guide: Ransomware Response and Prevention

by Ondrej Krehel, IANS Faculty

Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.

See Details
Guide icon
Guide

Security Operations

Harden M365 Identities and Exchange Online

by Aaron Turner, IANS Faculty

Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.

See Details
Infographic icon
Infographic

Management and Leadership

Ransomware Decision Tree for Executives

by Ondrej Krehel, IANS Faculty

Use our 'Ransomware Decision Tree for Executives' developed by IANS Faculty, Ondrej Krehel, for advice on how to prepare and respond to an incident.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.

See Details
Guide icon
Guide

Endpoint Detection & Response

Microsoft Defender vs. CrowdStrike Falcon for EDR

by Dave Shackleford, IANS Faculty

Compare endpoint detection and response solutions using our 'Microsoft Defender vs. CrowdStrike Falcon for EDR' guide from IANS Faculty, Dave Shackleford.

See Details
Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

Learn how to create IR metrics that focus on improvement and resonate with management using our 'Create Incident Response Metrics Worth Reporting' guide.

See Details
Checklist icon
Checklist

Cloud Network and Host Controls

Amazon Web Services (AWS) Checklist

by IANS Faculty

Download IANS' 'Amazon Web Services Checklist' to find practical, applicable security steps that organizations should take to ensure their workloads remain secure.

See Details
Guide icon
Guide

Identity and Access Management

Privileged Access Management (PAM) Decision-Maker

by Idan Shoham, IANS Faculty

Download the 'Privileged Access Management Decision-Maker' guide by IANS Faculty, Idan Shoham, to determine which accounts should be managed by a PAM process.

See Details
Guide icon
Guide

Executive Development

Building a More Diverse InfoSec Team

by IANS Research

Find actionable advice from security leaders on how to build and maintain a more diverse security team in IANS' first-party research report.

See Details
Checklist icon
Checklist

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.

See Details
Guide icon
Guide

Executive Development

5 Attributes of Top-Performing CISOs

by IANS Research

Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.

See Details
Guide icon
Guide

Networking

Zero Trust: A Step-by-Step Guide

by Dave Shackleford, IANS Faculty

Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.

See Details
Guide icon
Guide

Managing Vendors and Third Parties

Vendor Vulnerability and Remediation Policy Template

by Josh More, IANS Faculty

Find actionable, time-saving guidance with our ‘Vendor Vulnerability and Remediation Policy Template’ by IANS Faculty member, Josh More.

See Details
Guide icon
Guide

Security Operations

Top 8 SOAR Use Cases and Playbooks

by Gal Shpantzer, IANS Faculty

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

See Details