InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
While always a focus for security teams, third-party software security garnered more focus and attention following the SolarWinds breach. This checklist offers four high-level best practices for securing third-party software, each with one or more technology
solutions. Both commercial and open source solutions are included where available.
In this checklist you will find details on the following:
Complete the form and we'll send a copy of the Third-Party Security Checklist to your email.
We’ve received your request, and your content sample will be emailed to you shortly.
Please feel free to reach out to firstname.lastname@example.org with any questions.
Download the 'Privileged Access Management Decision-Maker' guide by IANS Faculty, Idan Shoham, to determine which accounts should be managed by a PAM process.
IANS Faculty, Dave Shackleford, explains the six key control areas of cloud security to help ensure your team adheres to foundational security practices.
In this detailed guide, IANS explains the key considerations and recommends settings within five primary areas that will provide the best security return-on-investment (ROI) with the least user experience impacts.