These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.
Digital forensics and eDiscovery have a great deal of overlap in terms of tools and processes. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers tips for choosing the right tool set to serve both sets of teams
and their workflows.
The realities of COVID-19 have exposed the glaring gaps in even the best business continuity plans (BCPs). In this Ask-an-Expert live interaction, IANS Faculty George Gerchow details some lessons learned that must be folded into today's BCPs so we can better address similar challenges in the future.
The OWASP Top Ten is a list of the 10 most common critical web application security risks, many of which are less than top-of-mind for developers. In this Ask-an-Expert written response, IANS Faculty Jason Gillam details what the Top Ten includes and offers tips for ensuring developers understand and apply it consistently.
Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.
Despite the COVID-19 pandemic, cloud service providers (CSPs) continue to innovate. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.
With the move to DevOps, many organizations are looking to use a variety of open source software packages and tools, but are unsure how best to vet them for security. In this report, IANS Faculty Josh More explains the main issues and offers eight key rules for assessing the tools and keeping the pipeline secure.
Encrypted messaging apps like Signal, WhatsApp and WeChat claim to offer top-notch privacy and security, but how secure are they really? In this report, IANS Faculty Josh More reviews their pros and cons, and recommends the best options for secure business communications.
Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.
This checklist provides security settings for Zoom, Microsoft Teams,
GoToMeeting, Cisco Webex, Slack and Google Meets (aka Hangouts). Some
settings are based on policy vs. security risk, but they are worth
evaluating. Developed by Mike Saurbaugh, IANS Faculty.
Building a Risk Register is a critical undertaking for organizations of
all sizes, and there are a number of factors that contribute to its
accuracy and success. This tool (updated with NIST mapping) offers a
step-by-step guide for identifying risk and harm, calculating exposure
and adopting appropriate security controls.
This template is for a typical privileged access policy and user
agreement. It includes key advice and recommendations for writing a
IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.
Health care organizations face the highest cost-per record when
suffering a data breach ($429 per lost record). Finance, tech,
pharmaceutical, services and energy are next on the list.
Ransomware is a type of malicious software that encrypts computer files
and can bring a company's physical and digital operations to a
standstill, resulting in loss of data and productivity. IANS recommends 6
steps to protect your organization.
Hackers are using the COVID-19 pandemic to customize new phishing email
attacks. This compilation includes phishing examples such as emails
purporting to come from the World Health Organization and fake travel
alerts seeking to obtain sensitive personal information.
The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.
Washington state Governor Jay Inslee signed a Microsoft-backed facial recognition law that allows state agencies to use the technology with these restrictions.
Hackers are capitalizing on the global shift to working & studying from home due to COVID-19. The shift to remote work opens up plenty of opportunities for hackers.
In 2019, more than 200,000 organizations submitted files that had been hacked in a ransomware attack – a 41 percent increase from 2018.
These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.
Please select which samples you'd like to receive, and we'll send them to your email.
We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.
End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.
We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend
actions, and then help you take them.
Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.