InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.
What makes the best CISOs stand out from their peers? To answer that question, IANS interviewed our network of executive recruiters specializing in InfoSec job placement to get their input on the skills, attributes and capabilities that differentiate
top performers. Download our guide, specifically designed to help further your professional development in the security area.
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology
solutions. Both commercial and open source solutions are included where available.
Learn the importance of a diverse information security team along with actionable advice on how to create and maintain diversity in this guide tailored to CISOs.
Privileged access should be provided to authorized users based on context vs. a one-size-fits-all approach. These workflows are designed to help you determine which accounts or groups should be managed by a PAM process and then how best to grant that
While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.
This downloadable guide explains how to create incident response (IR) metrics that focus on improvement and are likely to resonate with management.
Find a detailed comparison guide of how Microsoft Advanced Threat Protection (ATP) and CrowdStrike Falcon stack up against each other in the EDR space across feature sets and ease of use.
Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.
Gain a better understanding of the ransomware kill chain along with a step-by-step guide to ensure your organization is both protected against potential ransomware attacks and prepared to limit any damage should such an attack be successful.
Learn how M365 tenants can prioritize activities to protect against some of the more sophisticated Azure AD and Exchange Online attacks observed over the past year.