Sample Content

These content samples represent a selection of research available to our Decision Support clients in the IANS Insights Portal.
 
Ask-An-Expert Writeups icon

Ask-An-Expert Writeups

These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.

Ask-An-Expert icon
Ask-An-Expert

AppDev Frameworks

Secure Your Serverless Architecture

This report explains some of the potential risks of serverless and recommends ways to secure each component of your serverless architecture.

Ask-An-Expert icon
Ask-An-Expert

Business Continuity and Disaster Recovery (BCDR)

IaaS vs. On-Prem Backups: Know the Differences

This report explains the key differences between on-prem and cloud backups and offers recommendations for formulating an efficient, cost-effective IaaS backup strategy.

Ask-An-Expert icon
Ask-An-Expert

Cloud Application and Data Controls

Security-as-Code: Best Practices and Vendor Options

This report explains the main factors to consider when choosing a security-as-code vendor and provides best practices for avoiding issues with security groups (SGs) in deployments.

 
Faculty Reports icon

Faculty Reports

Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.

Faculty Reports icon
Faculty Reports

Cloud Network and Host Controls

Cloud Security: What to Expect in 2021

In this report, we bring you up to date on the current state of cloud threats, peer into what to expect in 2021 and offer a structured approach for tackling cloud security in an ever-changing landscape.

Faculty Reports icon
Faculty Reports

Cloud Network and Host Controls

IANS Cloud Security Update: Q4 2020

In this quarterly research report, we update IANS clients on the new developments occurring in the cloud security arena.

Faculty Reports icon
Faculty Reports

Vulnerability Assessment and Management

IANS Vulnerability and Breach Update: Q4 2020

This report updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

 
Tools and Templates icon

Tools and Templates

Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.

Tools & Templates icon
Tools & Templates

Networking and Network Devices

Zero Trust Use Case Guide

This guide details some common zero trust architecture (ZTA) use cases across people, applications and equipment, as well as the challenges associated with each.

Tools & Templates icon
Tools & Templates

Business Productivity

Office 365 Email Security Checklist

This checklist provides the most important and valuable controls for protecting email within Office 365.

Tools & Templates icon
Tools & Templates

Vendor and Partner Management

SolarWinds Vendor Impact Questionnaire

This questionnaire can be used as a guide for post-SolarWinds vendor risk assessments. It can be tailored to your specific risk assessments/requirements.

 
Content Aggregator icon

Content Aggregator

IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.

Content Aggregator icon
Content Aggregator

Malware and Advanced Threats

Executive Cyber Briefing: Protecting Against Ransomware Attacks

Ransomware is a type of malicious software that encrypts computer files until a sum of money is paid to the attackers. IANS recommends 6 steps to protect your organization.

Content Aggregator icon
Content Aggregator

Mobile Access and Device Management

Infographic: Protecting Against Mobile Device Location Tracking

Everyday mobile applications collect users' location data and share it with data brokers. This infographic – meant for employee security awareness – offers tips to lock down mobile phones accordingly.

Content Aggregator icon
Content Aggregator

Budgeting

Top 5 Cybersecurity Investments Since COVID-19 Began

The pandemic has prompted business leaders to increase cybersecurity investments in five key areas. This chart shows the top cybersecurity investments since the pandemic began.

 
Executive Communication icon

Executive Development

Materials comprised of actionable, CISO-specific content on executive leadership and management competencies that CISOs and their direct reports can use to function more effectively within the C-suite.

Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 1 – Creating a Prioritized Threat List

Part 1: IANS Faculty member Nick Mankovich covers the process of creating an initial threat list.

Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 2 – Collaborating With Business Leaders

Part 2: IANS Faculty member Nick Mankovich provides guidance on taking a prioritized threat list and presenting it to business stakeholders for input.

Executive Development icon
Executive Development

Mastering Risk

Building Your Threat Model: Part 3 – Putting Your Threat Model Into Action

Part 3: IANS Faculty member Nick Mankovich discusses how to use a custom threat model to inform decision-making within a security program.

 
Executive Communication icon

Executive Communications "Daily Dive"

The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.

Executive Communications icon
Executive Communications

Daily Dive Email

Latest Details on Russian Hack

The scope of the Russian hack on U.S. government agencies and companies continues to grow. The hack – which dates back to at least October 2019 – is believed to have impacted up to 250 federal agencies and companies.

Executive Communications icon
Executive Communications

Daily Dive Email

Patients of a Vermont Hospital Are Left ‘in the Dark’ After a Cyberattack

Russian cybercriminals continue to target American hospitals with ransomware attacks – cutting off their access to electronic health records and forcing them to turn patients away.

Executive Communications icon
Executive Communications

Daily Dive Email

Companies Battle Another Pandemic: Skyrocketing Hacking Attempts

Hackers are capitalizing on the pandemic-forced shift to remote work to exploit new vulnerabilities and break into corporate networks. Ensure remote employees understand their responsibilities.

 
 
 

Sign up to receive complimentary IANS content.

These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.

Submitted Loading animation
 

* Required Fields

Thank you for your interest in IANS content!

Please select which samples you'd like to receive, and we'll send them to your email.

What we do.

We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.

Decision Support

End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.

Learn More

Consulting

We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend actions, and then help you take them.

Learn More

Events

Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.

Learn More