Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 136
Guide Managing Vendors and Third Parties

Vendor Vulnerability and Remediation Policy Template

Find actionable, time-saving guidance with our ‘Vendor Vulnerability and Remediation Policy Template’ by IANS Faculty member, Josh More.
Josh More, IANS Faculty
Checklist THREATS AND VULNERABILITIES

Log4j Remediation Checklist

Use our Log4j Remediation Checklist from IANS Faculty, Tanya Janca to find and remediate Log4j exploits in your custom applications to prevent web server attacks.
Tanya Janca
Webinar Replay Team Structure and Management

CISO-Board Engagement: Moving Beyond Standard Reporting to Drive Risk-based Dialogues

Explore how security teams can safely enable AI agents and MCP connectors by applying practical discovery, identity, and control frameworks.

Steve Martano, IANS Faculty
Article Management and Leadership

The Retail CISO: Leading on Scope, Lagging on Resources

This article breaks down what the latest data reveals about the retail CISO role—where responsibility is expanding faster than authority, budget, and staffing.

    IANS
    Article Management and Leadership

    The Manufacturing CISO: Bridging Machines and Risk

    This article provides data-driven insight into how manufacturing CISOs are navigating expanding scope, growing OT risk, and evolving expectations from executive leadership.

      IANS
      Article Management and Leadership

      The Tech CISO: Moving Fast and Securing Everything

      What the data reveals about how technology security leaders are positioned, what's changing in their scope, and where they're headed next.

        IANS
        Ask-An-Expert Writeup Team Structure and Management

        Structure Cybersecurity Teams for Resilience

        This Ask-an-Expert writeup shows how security leaders can use NIST-aligned maturity frameworks to deliberately structure teams, roles and governance models that strengthen cybersecurity and operational resilience.

        Munish Walther-Puri
        Ask-An-Expert Writeup Board Communication and Metrics

        The CISO in 2030: Build Skills Now to Lead as the Role Evolves

        This Ask-an-Expert writeup provides a prescriptive roadmap for transforming security from a perceived business blocker into a trusted service provider.

        jeffrey brown
        Jeffrey Brown
        Ask-An-Expert Writeup Service Catalog/Centers of Excellence

        Transform Security From a Blocker to a Business Enabler

        This Ask-an-Expert writeup provides a prescriptive roadmap for transforming security from a perceived business blocker into a trusted service provider.

        Taryn Swietek