InfoSec Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.

Guide icon
Guide

Executive Development

5 Attributes of Top-Performing CISOs

by IANS Research

What makes the best CISOs stand out from their peers? To answer that question, IANS interviewed our network of executive recruiters specializing in InfoSec job placement to get their input on the skills, attributes and capabilities that differentiate top performers. Download our guide, specifically designed to help further your professional development in the security area.

See Details
Checklist icon
Checklist

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology solutions. Both commercial and open source solutions are included where available.

See Details
Guide icon
Guide

Executive Development

Building a More Diverse InfoSec Team

by IANS Research

Learn the importance of a diverse information security team along with actionable advice on how to create and maintain diversity in this guide tailored to CISOs.

See Details
Guide icon
Guide

Identity and Access Management

Privileged Access Management (PAM) Decision-Maker

by Idan Shoham, IANS Faculty

Privileged access should be provided to authorized users based on context vs. a one-size-fits-all approach. These workflows are designed to help you determine which accounts or groups should be managed by a PAM process and then how best to grant that privileged access.

See Details
Checklist icon
Checklist

Cloud Network and Host Controls

Amazon Web Services (AWS) Checklist

by IANS Faculty

While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.

See Details
Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

This downloadable guide explains how to create incident response (IR) metrics that focus on improvement and are likely to resonate with management.

See Details
Guide icon
Guide

Endpoint Detection & Response

Microsoft Defender vs. CrowdStrike Falcon for EDR

by Dave Shackleford, IANS Faculty

Find a detailed comparison guide of how Microsoft Advanced Threat Protection (ATP) and CrowdStrike Falcon stack up against each other in the EDR space across feature sets and ease of use.

See Details
Guide icon
Guide

Cloud Network and Host Controls

Six Key Control Areas of Cloud Security

by Dave Shackleford, IANS Faculty

Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.

See Details
Infographic icon
Infographic

Management and Leadership

Ransomware Decision Tree for Executives

by Ondrej Krehel, IANS Faculty

This two-part decision tree is designed to help executive management work through a ransomware incident, from detection to conclusion, with a focus on preparing the actions required by potential duties and obligations and preventing loss of evidence.

See Details
Guide icon
Guide

Threats and Vulnerabilities

Essential Guide: Ransomware Response and Prevention

by Ondrej Krehel, IANS Faculty

Gain a better understanding of the ransomware kill chain along with a step-by-step guide to ensure your organization is both protected against potential ransomware attacks and prepared to limit any damage should such an attack be successful.

See Details
Guide icon
Guide

Security Operations

Harden M365 Identities and Exchange Online

by Aaron Turner, IANS Faculty

Learn how M365 tenants can prioritize activities to protect against some of the more sophisticated Azure AD and Exchange Online attacks observed over the past year.

See Details