Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 19-27 of 99
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Assessing the Cyber Risks From the Iran Conflict

As tensions rise between the United States and Iran following the U.S.’ recent strikes on Iranian nuclear facilities, Cybersecurity teams must prepare for the cyber implications and risks that are to follow.

jake-williams
Jake Williams
Tools and Templates Security Policies and Strategy

Secure Remote Access Policy

Use this template to build a strong defense against remote threats by standardizing secure access, enforcing proven controls, and staying audit ready.
Joshua Danielson
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Imposter North Korean Remote Workers Infiltrating Western Companies

North Korean workers have infiltrated hundreds of Western companies (including cybersecurity firms and Fortune 500 orgs) posing as remote IT staff.

george-gerchow
George Gerchow
Report Management and Leadership

2025 Compensation and Budget for CISOs in the Small and Middle Market

Small and mid-sized organizations face unique cybersecurity challenges. Get actionable benchmarks and expert recommendations in this report based on survey data of nearly 400 CISOs from small and middle market organizations (under $1B in revenue).

IANS Research
Webinar Replay Management and Leadership

Webinar Replay: Securing Agentic AI: Understand Its Potential and Risks in the Real World

Join IANS Faculty Ashish Rajan as he shares practical insights and recommendations on the next evolution of AI to help you build your roadmap and securely accelerate its use.
Ashish Rajan
Ashish Rajan
Guide Vendor Assessment

PAM Implementation Playbook

The PAM Implementation Playbook is designed to help organizations streamline and secure privileged access across their IT environments. This actionable guide delivers a 5–8-month roadmap to help organizations take control of privileged access, reduce risk, and accelerate compliance.
dave-shackleford
Dave Shackleford
Guide Threats and Vulnerabilities

Threat Intelligence Policy and Procedure

This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.

shannon-leitz
Shannon Lietz
Tech Briefing Summary Incident Response and Recovery

CISA SaaS Attacks Warning, Lumma Stealer Takedown, Hackers Claim Coca-Cola Breaches

Access a summary of our recent Tech Briefing that reveals urgent cyber threats—including a zero-day exploit targeting Commvault and the Lumma Stealer malware takedown—and provides practical guidance to help security teams strengthen defenses and stay ahead. 
shannon-leitz
wolfgang-goerlich
Shannon Lietz
Wolfgang Goerlich
Webinar Replay Management and Leadership

Webinar Replay: Make the Case for Resources as Budgets Tighten in Healthcare

This industry-specific webinar with IANS Faculty member Steve Martano is designed to help you contextualize your program’s resourcing relative to your peers and justify your spend.
Steven Martano