These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.
Written by IANS Faculty member Michael Pinch, this report details the options and steps you through the process
of building an optimal MacOS logging and monitoring capability.
In this report, IANS Faculty member Ondrej Krehel outlines the main requirements for incident ticketing/tracking
tools, details three top contenders (RTIR, OTRS and TheHive) and walks you through the decision-making process.
Written by IANS Faculty member Ken Pyle, this report details seven of the most common phishing attacks against high-value
targets and explains how best to craft them and use them in your internal phishing campaigns.
Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.
Tracking and complying with the myriad of privacy and compliance laws and regulations in the U.S. and abroad is becoming increasingly difficult. In this quarterly research report, IANS Faculty member Rebecca Herold provides an update of new security-focused regulations/legislation and details their likely impacts on IANS clients.
In this quarterly research report, IANS Faculty member Mike Saurbaugh updates clients on the top vulnerabilities
and breaches from the past quarter and provides some real-world context and perspective.
As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty member Dave Shackleford updates IANS clients on the new developments occurring in the cloud security arena.
Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.
This checklist provides security settings for Zoom, Microsoft Teams,
GoToMeeting, Cisco Webex, Slack and Google Meets (aka Hangouts). Some
settings are based on policy vs. security risk, but they are worth
Building a Risk Register is a critical undertaking for organizations of
all sizes, and there are a number of factors that contribute to its
accuracy and success. This tool (updated with NIST mapping) offers a
step-by-step guide for identifying risk and harm, calculating exposure
and adopting appropriate security controls.
This template is for a typical privileged access policy and user
agreement. It includes key advice and recommendations for writing a
IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.
Health care organizations face the highest cost-per record when
suffering a data breach ($429 per lost record). Finance, tech,
pharmaceutical, services and energy are next on the list.
Ransomware is a type of malicious software that encrypts computer files
and can bring a company's physical and digital operations to a
standstill, resulting in loss of data and productivity. IANS recommends 6
steps to protect your organization.
Hackers are using the COVID-19 pandemic to customize new phishing email
attacks. This compilation includes phishing examples such as emails
purporting to come from the World Health Organization and fake travel
alerts seeking to obtain sensitive personal information.
The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.
Hackers took over the Twitter accounts of celebrities, politicians &
major companies and tweeted scam messages encouraging their followers
to send Bitcoin to a cryptocurrency wallet.
In 2019, more than 200,000 organizations submitted files that had been hacked in a ransomware attack – a 41 percent increase from 2018.
Hackers are capitalizing on the global shift to working & studying from home due to COVID-19. The shift to remote work opens up plenty of opportunities for hackers.
These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.
Please select which samples you'd like to receive, and we'll send them to your email.
We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.
End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.
We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend
actions, and then help you take them.
Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.