IANS InfoSec Content

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.

Infographic icon
Infographic

Management and Leadership

IANS CISO Compensation and Budget Benchmarks

by IANS Research

Access IANS' first-party survey data from 175 CISOs across the U.S. - depicted in a set of two infographics - for perspective on their compensation and security budgets.

See Details
Checklist icon
Checklist

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.

See Details
Guide icon
Guide

Executive Development

5 Attributes of Top-Performing CISOs

by IANS Research

What makes the best CISOs stand out from their peers? To answer that question, IANS interviewed our network of executive recruiters specializing in InfoSec job placement to get their input on the skills, attributes and capabilities that differentiate top performers. Download our guide, specifically designed to help further your professional development in the security area.

See Details
Security Briefing icon
Security Briefing

Executive Communications

Ransomware Attack Forces Major U.S. Pipeline Shutdown

by IANS Research

Security breaches hit the news daily. You see them, your CXOs see them, and your board sees them. Your leadership needs an explanation of what happened, if and how it affects your business, and what you're doing about it – and they want answers immediately. Our Executive Communications Security Briefings provide answers.

See Details
Guide icon
Guide

Executive Development

Building a More Diverse InfoSec Team

by IANS Research

Learn the importance of a diverse information security team along with actionable advice on how to create and maintain diversity in this guide tailored to CISOs.

See Details
Guide icon
Guide

Identity and Access Management

Privileged Access Management (PAM) Decision-Maker

by Idan Shoham, IANS Faculty

Privileged access should be provided to authorized users based on context vs. a one-size-fits-all approach. These workflows are designed to help you determine which accounts or groups should be managed by a PAM process and then how best to grant that privileged access.

See Details
Checklist icon
Checklist

Cloud Network and Host Controls

Amazon Web Services (AWS) Checklist

by IANS Faculty

While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.

See Details
Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

This downloadable guide explains how to create incident response (IR) metrics that focus on improvement and are likely to resonate with management.

See Details
Quarterly Report icon
Quarterly Report

Regulations and Legislation

IANS Security, Privacy and Compliance Law Update: Q2 2021

by Rebecca Herold, IANS Faculty

In this robust quarterly report, IANS dives into some of the emerging international compliance laws and regulations that impact the information security and privacy communities, as well as related significant news to inform business leaders of actions that could affect how organizations approach and manage information security and privacy.

See Details
Guide icon
Guide

Endpoint Detection & Response

Microsoft Defender vs. CrowdStrike Falcon for EDR

by Dave Shackleford, IANS Faculty

Find a detailed comparison guide of how Microsoft Advanced Threat Protection (ATP) and CrowdStrike Falcon stack up against each other in the EDR space across feature sets and ease of use.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.

See Details
Infographic icon
Infographic

Wireless Networks

Wi-Fi Security Best Practices

by IANS Research

Improperly secured Wi-Fi networks give hackers an easy path to stealing sensitive corporate data. This infographic -- intended for employee security awareness -- details the attack types that exploit weak Wi-Fi security and offers tips for strong home Wi-Fi network security.

See Details

On-Demand InfoSec Webinars

January 1

With privacy regulations and laws regularly updated and new laws frequently emerging in different jurisdictions, security teams need to become more adaptable in their compliance strategies. Register to learn how to stay on top of the shifting regulatory climate and build programs for greater flexibility from IANS Faculty member Rebecca Herold.

Speakers:
  • Rebecca Herold

    Rebecca Herold

    IANS Faculty

    Rebecca is Founder, Owner, and CEO of Rebecca Herold, LLC aka The Privacy Professor®, an information security, privacy, IT, and compliance services firm. She also co-founded Privacy Security Brainiacs, a SaaS platform, early 2020 with her oldest son, Noah. Rebecca also serves as a Distinguished Ponemon Institute Fellow and as an Advisory Board Member for multiple technology businesses and startups. Additionally, Rebecca serves as an expert witness for diverse cases, is an advisor on multiple high school and college/university curriculum and program boards, and hosts a VoiceAmerica radio show called “Data Security & Privacy with the Privacy Professor.”

January 1

An increasing number of security firms are offering ransomware brokering services. The idea: Let an experienced middleman negotiate with attackers on the amount and delivery of ransom to unlock hijacked files and systems. Is it the right thing to do? And if so, how best to proceed? Register for the webinar where IANS Faculty John Strand walks through the do’s and don’ts.

Speakers:
  • John Strand

    John Strand

    IANS Faculty

    John is the Owner of Black Hills Information Security (BHIS) where he leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration and Pivot testing development. He is also a SANS Institute Senior Instructor. In these roles, John has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing.

January 1

Security teams are concerned that their incident/event management needs have grown beyond the scope and sophistication of mainstream SIEM tools. Register for this on-demand session where IANS Faculty Mick Douglas helps you gain a better understanding of alternative options and major enhancements available in the marketplace.

Speakers:
  • Mick Douglas

    Mick Douglas

    IANS Faculty

    Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.