Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 66
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Newly Discovered Weaknesses Put Web-Based Authentication at Risk

In this briefing, Jake Williams details a newly disclosed vulnerability class has emerged caused by a weakness in the underlying standards for OAuth 2.0, OpenID Connect and FAPI, why security teams should be prioritizing this and provides steps to take, specifically from a third-party risk management perspective.

jake-williams
Jake Williams
Guide Vendor Assessment

PAM Market Guide

This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Nick Hunt
wolfgang-goerlich
Nick Hunt
Wolfgang Goerlich
Tools and Templates Team Structure and Management

Cybersecurity Job Description Templates

This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.
IANS Research
Tools and Templates Vendor Management

AI Vendor Questionnaire

Uncover risks and ensure responsible AI use across your vendor landscape with this comprehensive questionnaire designed to assess the security, privacy, compliance, and ethical standards of third-party AI tools.
Jason Robbins
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Navigating Uncertainty Around the CVE Program

The security industry received a scare on April 15th when MITRE warned that funding for its stewardship for the Common Vulnerabilities and Exposures (CVE) program was set to expire. Join IANS Faculty Jake Williams and Summer Fowler as they provide an update on where we stand with the CVE program, offer lessons CISOs should take from this situation and give recommendations for adapting to continued shifts in govt cybersecurity funding.

jake-williams
Jake Williams
Summer Fowler
Tools and Templates Incident Response and Recovery

Incident Response Plan Template

This template is a dynamic, NIST-aligned guide that outlines a consistent incident handling process while allowing for the flexible addition of scenario-specific guidance.
Alex Sharpe- IANS Faculty
Alex Sharpe
Webinar Replay Management and Leadership

Webinar Replay: Cyber Defenses in Manufacturing

This industry-specific webinar with IANS Faculty member Bill Dean addresses the unique cybersecurity challenges facing manufacturing organizations including the complexities of IT & OT systems, navigating legacy systems, and more.
bill-dean
Bill Dean
Guide Networking

Ransomware Resilience: 9 Steps to Secure Operational Technology

Securing OT/ICS environments requires a strategic approach that integrates IT and OT efforts. Enhance your operational resiliency and maintain robust security by following the priorities and recommendations outlined in this guide.
jennifer-minella
Jennifer Minella
Briefing Replay Management and Leadership

Incident Briefing: Treasury OCC Discloses Email Breach

On April 8th, 2025, the Office of the Comptroller of the Currency (OCC) notified Congress of a major information security incident involving the compromise of its email system by a threat actor. The incident likely allowed threat actors to read "highly sensitive information relating to the financial condition of federally regulated financial institutions" that OCC uses for oversight of banks.

jake-williams
Jake Williams