Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 55-63 of 64
Report Management and Leadership

2023 Cloud Security Maturity Benchmark Report

Use the 2023 Cloud Security Maturity Benchmark Report developed by IANS and Securosis to help assess -and improve -your cloud security program.
IANS + Securosis
Guide Incident Response and Recovery

Tabletop Scenario Templates

Help better prepare your organization for potential cyberattacks using these 8 tabletop scenario templates.

Bill Dean, IANS Faculty
Checklist Enterprise Software

GRC Roles and Responsibilities Checklist

Find a timesaving checklist that details the GRC tasks commonly implemented at most organizations.
justin-leapline
Justin Leapline
Checklist Incident Response and Recovery

Ransomware Prep Toolkit

Use our Ransomware Prep Toolkit from IANS Faculty, Dave Shackleford to prepare and respond to ransomware incidents quickly and effectively.
dave-shackleford
Dave Shackleford
Guide Security Operations

Top 8 SOAR Use Cases and Playbooks

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

Gal Shpantzer, IANS Faculty
Tools and Templates Networking

Zero Trust: A Step-by-Step Guide

Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
dave-shackleford
Dave Shackleford
Guide Security Operations

Harden M365 Identities and Exchange Online

Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.

Aaron Turner, IANS Faculty
Guide Executive Development

5 Attributes of Top-Performing CISOs

Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.
IANS Research
Checklist Vendor and Partner Management

Third-Party Software Security Checklist

Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.
Richard Seiersen, IANS Faculty