Cybersecurity Tools & Guides
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.
Showing 55-63 of 64
Report
Management and Leadership
2023 Cloud Security Maturity Benchmark Report
Use the 2023 Cloud Security Maturity Benchmark Report developed by IANS and Securosis to help assess -and improve -your cloud security program.
IANS + Securosis
Guide
Incident Response and Recovery
Tabletop Scenario Templates
Help better prepare your organization for potential cyberattacks using these 8 tabletop scenario templates.
Bill Dean, IANS Faculty
Checklist
Enterprise Software
GRC Roles and Responsibilities Checklist
Find a timesaving checklist that details the GRC tasks commonly implemented at most organizations.

Justin Leapline
Checklist
Incident Response and Recovery
Ransomware Prep Toolkit
Use our Ransomware Prep Toolkit from IANS Faculty, Dave Shackleford to prepare and respond to ransomware incidents quickly and effectively.

Dave Shackleford
Guide
Security Operations
Top 8 SOAR Use Cases and Playbooks
Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.
Gal Shpantzer, IANS Faculty
Tools and Templates
Networking
Zero Trust: A Step-by-Step Guide
Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.

Dave Shackleford
Guide
Security Operations
Harden M365 Identities and Exchange Online
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Aaron Turner, IANS Faculty
Guide
Executive Development
5 Attributes of Top-Performing CISOs
Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.
IANS Research
Checklist
Vendor and Partner Management
Third-Party Software Security Checklist
Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.
Richard Seiersen, IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.