Sample Content

These samples represent a selection of research available to our Decision Support clients in the IANS Insights Portal.
 
Ask-An-Expert Writeups icon

Ask-An-Expert Writeups

These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.

Ask-An-Expert icon
Ask-An-Expert

IT Forensics

Improve Digital Forensics and eDiscovery Efficiencies

Digital forensics and eDiscovery have a great deal of overlap in terms of tools and processes. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers tips for choosing the right tool set to serve both sets of teams and their workflows.

Ask-An-Expert icon
Ask-An-Expert

Business Continuity and Disaster Recovery (BCDR)

COVID-19: Address the Next Black Swan in Your BCP

The realities of COVID-19 have exposed the glaring gaps in even the best business continuity plans (BCPs). In this Ask-an-Expert live interaction, IANS Faculty George Gerchow details some lessons learned that must be folded into today's BCPs so we can better address similar challenges in the future.

Ask-An-Expert icon
Ask-An-Expert

Software Development Lifecycle (SDLC)

Help Developers Understand and Use the OWASP Top Ten

The OWASP Top Ten is a list of the 10 most common critical web application security risks, many of which are less than top-of-mind for developers. In this Ask-an-Expert written response, IANS Faculty Jason Gillam details what the Top Ten includes and offers tips for ensuring developers understand and apply it consistently.

 
Faculty Reports icon

Faculty Reports

Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.

Faculty Report icon
Faculty Report

Cloud Application and Data Controls

IANS Cloud Security Update: Q1 2020

Despite the COVID-19 pandemic, cloud service providers (CSPs) continue to innovate. In this quarterly research report, IANS Faculty Dave Shackleford updates IANS’ clients on the new developments occurring in the cloud security arena.

Faculty Report icon
Faculty Report

DevOps Organization and Strategy

8 Rules for Effectively Managing Open Source in the Enterprise

With the move to DevOps, many organizations are looking to use a variety of open source software packages and tools, but are unsure how best to vet them for security. In this report, IANS Faculty Josh More explains the main issues and offers eight key rules for assessing the tools and keeping the pipeline secure.

Faculty Report icon
Faculty Report

Encryption, Digital Signatures, Certificates, Tokenization

Choose a Trustworthy Encrypted Messaging Option

Encrypted messaging apps like Signal, WhatsApp and WeChat claim to offer top-notch privacy and security, but how secure are they really? In this report, IANS Faculty Josh More reviews their pros and cons, and recommends the best options for secure business communications.

 
Tools and Templates icon

Tools and Templates

Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.

Tools & Templates icon
Tools & Templates

Business Productivity

Collaboration Tool Security Checklist

This checklist provides security settings for Zoom, Microsoft Teams, GoToMeeting, Cisco Webex, Slack and Google Meets (aka Hangouts). Some settings are based on policy vs. security risk, but they are worth evaluating. Developed by Mike Saurbaugh, IANS Faculty.

Tools & Templates icon
Tools & Templates

Risk Management

IANS Risk Register Tool (Updated with NIST Mapping)

Building a Risk Register is a critical undertaking for organizations of all sizes, and there are a number of factors that contribute to its accuracy and success. This tool (updated with NIST mapping) offers a step-by-step guide for identifying risk and harm, calculating exposure and adopting appropriate security controls.

Tools & Templates icon
Tools & Templates

Privileged Access Management

Privileged Access Policy and User Agreement Template

This template is for a typical privileged access policy and user agreement. It includes key advice and recommendations for writing a comprehensive policy.

 
Content Aggregator icon

Content Aggregator

IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.

Content Aggregator icon
Content Aggregator

Single Slide - Data Breaches

Data Breaches: Cost Per Lost Record, By Industry

Health care organizations face the highest cost-per record when suffering a data breach ($429 per lost record). Finance, tech, pharmaceutical, services and energy are next on the list.

Content Aggregator icon
Content Aggregator

Slide Narrative - Malware and Advanced Threats

Executive Cyber Briefing: Protecting Against Ransomware Attacks

Ransomware is a type of malicious software that encrypts computer files and can bring a company's physical and digital operations to a standstill, resulting in loss of data and productivity. IANS recommends 6 steps to protect your organization.

Content Aggregator icon
Content Aggregator

Slide Compilation - Security Awareness, Phishing, Social Engineering

COVID-19 Phishing Emails: What to Watch Out For (6 Slides)

Hackers are using the COVID-19 pandemic to customize new phishing email attacks. This compilation includes phishing examples such as emails purporting to come from the World Health Organization and fake travel alerts seeking to obtain sensitive personal information.

 
Executive Communication icon

Executive Communications "Daily Dive"

The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.

Executive Communications icon
Executive Communications

Daily Dive Email

WSJ: Washington State OKs Facial Recognition Law Seen as National Model

Washington state Governor Jay Inslee signed a Microsoft-backed facial recognition law that allows state agencies to use the technology with these restrictions.

Executive Communications icon
Executive Communications

Daily Dive Email

Reuters: Mass Move to Work From Home in Coronavirus Crisis Creates Opening for Hackers: Cyber Experts

Hackers are capitalizing on the global shift to working & studying from home due to COVID-19. The shift to remote work opens up plenty of opportunities for hackers.

Executive Communications icon
Executive Communications

Daily Dive Email

NYT: Ransomware Attacks Grow, Crippling Cities and Businesses

In 2019, more than 200,000 organizations submitted files that had been hacked in a ransomware attack – a 41 percent increase from 2018.

 
 
 

Sign up to receive complimentary IANS content.

These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.

Submitted Loading animation
 

* Required Fields

Thank you for your interest in IANS content!

Please select which samples you'd like to receive, and we'll send them to your email.

What we do.

We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.

Decision Support

End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.

Learn More

Consulting

We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend actions, and then help you take them.

Learn More

Events

Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.

Learn More