These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.
This report explains some of the potential risks of serverless and
recommends ways to secure each component of your serverless
This report explains the key differences between on-prem and cloud
backups and offers recommendations for formulating an efficient,
cost-effective IaaS backup strategy.
This report explains the main factors to consider when choosing a security-as-code vendor and provides best practices for avoiding issues with security groups (SGs) in deployments.
Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.
In this report, we bring you up to date on the current state of cloud
threats, peer into what to expect in 2021 and offer a structured
approach for tackling cloud security in an ever-changing landscape.
In this quarterly research report, we update IANS clients on the new developments occurring in the cloud security arena.
This report updates clients on the top vulnerabilities and breaches from
the past quarter and provides some real-world context and perspective.
Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.
This guide details some common zero trust architecture (ZTA) use cases
across people, applications and equipment, as well as the challenges
associated with each.
This checklist provides the most important and valuable controls for protecting email within Office 365.
This questionnaire can be used as a guide for post-SolarWinds vendor
risk assessments. It can be tailored to your specific risk
IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.
Ransomware is a type of malicious software that encrypts computer files
until a sum of money is paid to the attackers. IANS recommends 6 steps
to protect your organization.
Everyday mobile applications collect users' location data and share it
with data brokers. This infographic – meant for employee security
awareness – offers tips to lock down mobile phones accordingly.
The pandemic has prompted business leaders to increase cybersecurity
investments in five key areas. This chart shows the top cybersecurity
investments since the pandemic began.
Materials comprised of actionable, CISO-specific content on executive leadership and management competencies that CISOs and their direct reports can use to function more effectively within the C-suite.
Part 1: IANS Faculty member Nick Mankovich covers the process of creating an initial threat list.
Part 2: IANS Faculty member Nick Mankovich provides guidance on taking a
prioritized threat list and presenting it to business stakeholders for
Part 3: IANS Faculty member Nick Mankovich discusses how to use a custom
threat model to inform decision-making within a security program.
The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.
The scope of the Russian hack on U.S. government agencies and companies continues to grow. The hack – which dates back to at least October 2019 – is believed to have impacted up to 250 federal agencies and companies.
Russian cybercriminals continue to target American hospitals with ransomware attacks – cutting off their access to electronic health records and forcing them to turn patients away.
Hackers are capitalizing on the pandemic-forced shift to remote work to exploit new vulnerabilities and break into corporate networks. Ensure remote employees understand their responsibilities.
These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.
Please select which samples you'd like to receive, and we'll send them to your email.
We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.
End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.
We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend
actions, and then help you take them.
Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.