InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.
Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Use our 'Ransomware Decision Tree for Executives' developed by IANS Faculty, Ondrej Krehel, for advice on how to prepare and respond to an incident.
IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.
Compare endpoint detection and response solutions using our 'Microsoft Defender vs. CrowdStrike Falcon for EDR' guide from IANS Faculty, Dave Shackleford.
Learn how to create IR metrics that focus on improvement and resonate with management using our 'Create Incident Response Metrics Worth Reporting' guide.
Download IANS' 'Amazon Web Services Checklist' to find practical, applicable security steps that organizations should take to ensure their workloads remain secure.
Download the 'Privileged Access Management Decision-Maker' guide by IANS Faculty, Idan Shoham, to determine which accounts should be managed by a PAM process.
Find actionable advice from security leaders on how to build and maintain a more diverse security team in IANS' first-party research report.
Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.
Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Find actionable, time-saving guidance with our ‘Vendor Vulnerability and Remediation Policy Template’ by IANS Faculty member, Josh More.
Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.