IANS InfoSec Content

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.

Ask-An-Expert icon
Ask-An-Expert

AppDev Frameworks

Secure Your Serverless Architecture

by Dave Shackleford

This report explains some of the potential risks of serverless and recommends ways to secure each component of your serverless architecture.

See Details
Ask-An-Expert icon
Ask-An-Expert

Business Continuity and Disaster Recovery (BCDR)

IaaS vs. On-Prem Backups: Know the Differences

by Jake Williams

This report explains the key differences between on-prem and cloud backups and offers recommendations for formulating an efficient, cost-effective IaaS backup strategy.

See Details
Ask-An-Expert icon
Ask-An-Expert

Cloud Application and Data Controls

Security-as-Code: Best Practices and Vendor Options

by George Gerchow

This report explains the main factors to consider when choosing a security-as-code vendor and provides best practices for avoiding issues with security groups (SGs) in deployments.

See Details
Faculty Reports icon
Faculty Reports

Vulnerability Assessment and Management

IANS Vulnerability and Breach Update: Q4 2020

by Mike Saurbaugh

This report updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

See Details
Faculty Reports icon
Faculty Reports

Cloud Network and Host Controls

IANS Cloud Security Update: Q4 2020

by Dave Shackleford

In this quarterly research report, we update IANS clients on the new developments occurring in the cloud security arena.

See Details
Faculty Reports icon
Faculty Reports

Cloud Network and Host Controls

Cloud Security: What to Expect in 2021

by Matt Chiodi

In this report, we bring you up to date on the current state of cloud threats, peer into what to expect in 2021 and offer a structured approach for tackling cloud security in an ever-changing landscape.

See Details
Tools & Templates icon
Tools & Templates

Business Productivity

Office 365 Email Security Checklist

by Dave Shackleford

This checklist provides the most important and valuable controls for protecting email within Office 365.

See Details
Tools & Templates icon
Tools & Templates

Networking and Network Devices

Zero Trust Use Case Guide

by Wolfgang Goerlich

This guide details some common zero trust architecture (ZTA) use cases across people, applications and equipment, as well as the challenges associated with each.

See Details
Tools & Templates icon
Tools & Templates

Vendor and Partner Management

SolarWinds Vendor Impact Questionnaire

by Jake Williams

This questionnaire can be used as a guide for post-SolarWinds vendor risk assessments. It can be tailored to your specific risk assessments/requirements.

See Details
Content Aggregator icon
Content Aggregator

Budgeting

Top 5 Cybersecurity Investments Since COVID-19 Began

by IANS

The pandemic has prompted business leaders to increase cybersecurity investments in five key areas. This chart shows the top cybersecurity investments since the pandemic began.

See Details
Content Aggregator icon
Content Aggregator

Slide Narrative - Malware and Advanced Threats

Executive Cyber Briefing: Protecting Against Ransomware Attacks

by IANS

Ransomware is a type of malicious software that encrypts computer files and can bring a company's physical and digital operations to a standstill, resulting in loss of data and productivity. IANS recommends 6 steps to protect your organization.

See Details
Content Aggregator icon
Content Aggregator

Mobile Access and Device Management

Infographic: Protecting Against Mobile Device Location Tracking

by IANS

Everyday mobile applications collect users' location data and share it with data brokers. This infographic – meant for employee security awareness – offers tips to lock down mobile phones accordingly.

See Details
Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 1 – Creating a Prioritized Threat List

by Nick Mankovich

Part 1: IANS Faculty member Nick Mankovich covers the process of creating an initial threat list.

See Details
Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 2 – Collaborating With Business Leaders

by Nick Mankovich

Part 2: IANS Faculty member Nick Mankovich provides guidance on taking a prioritized threat list and presenting it to business stakeholders for input.

See Details
Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 3 – Putting Your Threat Model Into Action

by Nick Mankovich

Part 3: IANS Faculty member Nick Mankovich discusses how to use a custom threat model to inform decision-making within a security program.

See Details
Executive Communications icon
Executive Communications

Daily Dive Email

Latest Details on Russian Hack

by IANS

The scope of the Russian hack on U.S. government agencies and companies continues to grow. The hack – which dates back to at least October 2019 – is believed to have impacted up to 250 federal agencies and companies.

See Details
Executive Communications icon
Executive Communications

Daily Dive Email

Companies Battle Another Pandemic: Skyrocketing Hacking Attempts

by IANS

Hackers are capitalizing on the pandemic-forced shift to remote work to exploit new vulnerabilities and break into corporate networks. Ensure remote employees understand their responsibilities.

See Details
Executive Communications icon
Executive Communications

Daily Dive Email

Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack

by IANS

Russian cybercriminals continue to target American hospitals with ransomware attacks – cutting off their access to electronic health records and forcing them to turn patients away.

See Details

What we do.

We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.

Decision Support

End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.

Learn More

Consulting

We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend actions, and then help you take them.

Learn More

Events

Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.

Learn More