InfoSec-Specific Executive Development for CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive labs to build you and your team's InfoSec skills
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.
Access IANS' first-party survey data from 175 CISOs across the U.S. - depicted in a set of two infographics - for perspective on their compensation and security budgets.
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology
solutions. Both commercial and open source solutions are included where available.
What makes the best CISOs stand out from their peers? To answer that question, IANS interviewed our network of executive recruiters specializing in InfoSec job placement to get their input on the skills, attributes and capabilities that differentiate
top performers. Download our guide, specifically designed to help further your professional development in the security area.
Security breaches hit the news daily. You see them, your CXOs see them, and your board sees them. Your leadership needs an explanation of what happened, if and how it affects your business, and what you're doing about it – and they want answers
immediately. Our Executive Communications Security Briefings provide answers.
Learn the importance of a diverse information security team along with actionable advice on how to create and maintain diversity in this guide tailored to CISOs.
Privileged access should be provided to authorized users based on context vs. a one-size-fits-all approach. These workflows are designed to help you determine which accounts or groups should be managed by a PAM process and then how best to grant that
While there are many security best practices for organizations making the move to Amazon Web Services (AWS), this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.
This downloadable guide explains how to create incident response (IR) metrics that focus on improvement and are likely to resonate with management.
In this robust quarterly report, IANS dives into some of the emerging international compliance laws and regulations that impact the information security and privacy communities, as well as related significant news to inform business leaders of actions
that could affect how organizations approach and manage information security and privacy.
Find a detailed comparison guide of how Microsoft Advanced Threat Protection (ATP) and CrowdStrike Falcon stack up against each other in the EDR space across feature sets and ease of use.
Completely locking down all your cloud workloads is a daunting endeavor. This piece explains how focusing on six key control areas can help ensure security teams get a solid head start in the cloud by adhering to foundational security practices.
Improperly secured Wi-Fi networks give hackers an easy path to stealing sensitive corporate data. This infographic -- intended for employee security awareness -- details the attack types that exploit weak Wi-Fi security and offers
tips for strong home Wi-Fi network security.
With privacy regulations and laws regularly updated and new laws frequently emerging in different jurisdictions, security teams need to become more adaptable in their compliance strategies. Register to learn how to stay on top of the shifting regulatory climate and build programs for greater flexibility from IANS Faculty member Rebecca Herold.
Rebecca is Founder, Owner, and CEO of Rebecca Herold, LLC aka The Privacy Professor®, an information security, privacy, IT, and compliance services firm. She also co-founded Privacy Security Brainiacs, a SaaS platform, early 2020 with her oldest son, Noah. Rebecca also serves as a Distinguished Ponemon Institute Fellow and as an Advisory Board Member for multiple technology businesses and startups. Additionally, Rebecca serves as an expert witness for diverse cases, is an advisor on multiple high school and college/university curriculum and program boards, and hosts a VoiceAmerica radio show called “Data Security & Privacy with the Privacy Professor.”
An increasing number of security firms are offering ransomware brokering services. The idea: Let an experienced middleman negotiate with attackers on the amount and delivery of ransom to unlock hijacked files and systems. Is it the right thing to do? And if so, how best to proceed? Register for the webinar where IANS Faculty John Strand walks through the do’s and don’ts.
John is the Owner of Black Hills Information Security (BHIS) where he
leads the Hunt Teaming, Command & Control (C2)/Data Exfiltration
and Pivot testing development. He is also a SANS Institute Senior
Instructor. In these roles, John has both consulted
and taught hundreds of organizations in the areas of security,
regulatory compliance, and penetration testing.
Security teams are concerned that their incident/event management needs have grown beyond the scope and sophistication of mainstream SIEM tools. Register for this on-demand session where IANS Faculty Mick Douglas helps you gain a better understanding of alternative options and major enhancements available in the marketplace.
Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.