Sample Content

These content samples represent a selection of research available to our Decision Support clients in the IANS Insights Portal.
 
Ask-An-Expert Writeups icon

Ask-An-Expert Writeups

These 500–1,000 word documents are based on Ask-An-Expert inquiries with IANS Faculty members and detail the unique challenges and takeaways.

Ask-An-Expert icon
Ask-An-Expert

SIEM

Establish Optimal MacOS Logging and Monitoring

Written by IANS Faculty member Michael Pinch, this report details the options and steps you through the process of building an optimal MacOS logging and monitoring capability.

Ask-An-Expert icon
Ask-An-Expert

Incident Investigations, Handling and Tracking

Choose the Right Incident Ticketing/Tracking Tool

In this report, IANS Faculty member Ondrej Krehel outlines the main requirements for incident ticketing/tracking tools, details three top contenders (RTIR, OTRS and TheHive) and walks you through the decision-making process.

Ask-An-Expert icon
Ask-An-Expert

Security Awareness, Phishing, Social Engineering

Top 7 Tactics to Use When Phishing Executives and Other High-Value Targets

Written by IANS Faculty member Ken Pyle, this report details seven of the most common phishing attacks against high-value targets and explains how best to craft them and use them in your internal phishing campaigns.

 
Faculty Reports icon

Faculty Reports

Written by IANS Faculty members, these research reports cover topics that are most relevant to our client base.

Faculty Reports icon
Faculty Reports

Privacy

IANS Security, Privacy and Compliance Law Update: Q2 2020

Tracking and complying with the myriad of privacy and compliance laws and regulations in the U.S. and abroad is becoming increasingly difficult. In this quarterly research report, IANS Faculty member Rebecca Herold provides an update of new security-focused regulations/legislation and details their likely impacts on IANS clients.

Faculty Reports icon
Faculty Reports

Data Breaches

IANS Vulnerability and Breach Update: Q2 2020

In this quarterly research report, IANS Faculty member Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Faculty Reports icon
Faculty Reports

Cloud Application and Data Controls

IANS Cloud Security Update: Q2 2020

As organizations continue to move services and computing assets into cloud service provider environments, the need for adequate security controls grows as well. In this quarterly research report, IANS Faculty member Dave Shackleford updates IANS clients on the new developments occurring in the cloud security arena.

 
Tools and Templates icon

Tools and Templates

Developed and used by industry experts, these materials offer step-by-step guidance on approaching and completing security-specific tasks.

Tools & Templates icon
Tools & Templates

Business Productivity

Collaboration Tool Security Checklist

This checklist provides security settings for Zoom, Microsoft Teams, GoToMeeting, Cisco Webex, Slack and Google Meets (aka Hangouts). Some settings are based on policy vs. security risk, but they are worth evaluating.

Tools & Templates icon
Tools & Templates

Risk Management

IANS Risk Register Tool (Updated with NIST Mapping)

Building a Risk Register is a critical undertaking for organizations of all sizes, and there are a number of factors that contribute to its accuracy and success. This tool (updated with NIST mapping) offers a step-by-step guide for identifying risk and harm, calculating exposure and adopting appropriate security controls.

Tools & Templates icon
Tools & Templates

Privileged Access Management

Privileged Access Policy and User Agreement Template

This template is for a typical privileged access policy and user agreement. It includes key advice and recommendations for writing a comprehensive policy.

 
Content Aggregator icon

Content Aggregator

IANS digests and summarizes security data in reusable slides. This slideware provides vetted source material coupled with professionally formatted visuals suitable for presenting to senior leadership.

Content Aggregator icon
Content Aggregator

Single Slide - Data Breaches

Data Breaches: Cost Per Lost Record, By Industry

Health care organizations face the highest cost-per record when suffering a data breach ($429 per lost record). Finance, tech, pharmaceutical, services and energy are next on the list.

Content Aggregator icon
Content Aggregator

Slide Narrative - Malware and Advanced Threats

Executive Cyber Briefing: Protecting Against Ransomware Attacks

Ransomware is a type of malicious software that encrypts computer files and can bring a company's physical and digital operations to a standstill, resulting in loss of data and productivity. IANS recommends 6 steps to protect your organization.

Content Aggregator icon
Content Aggregator

Slide Compilation - Security Awareness, Phishing, Social Engineering

COVID-19 Phishing Emails: What to Watch Out For (6 Slides)

Hackers are using the COVID-19 pandemic to customize new phishing email attacks. This compilation includes phishing examples such as emails purporting to come from the World Health Organization and fake travel alerts seeking to obtain sensitive personal information.

 
Executive Communication icon

Executive Communications "Daily Dive"

The Daily Dive email is a daily round-up of security news from major media sources, delivered at 9:00 AM Eastern. It includes a summary of each story, key points to know, and what to communicate to your executive team.

Executive Communications icon
Executive Communications

Daily Dive Email

Compilation: High-Profile Twitter Users’ Accounts Hacked in Crypto Scam

Hackers took over the Twitter accounts of celebrities, politicians & major companies and tweeted scam messages encouraging their followers to send Bitcoin to a cryptocurrency wallet.

Executive Communications icon
Executive Communications

Daily Dive Email

NYT: Ransomware Attacks Grow, Crippling Cities and Businesses

In 2019, more than 200,000 organizations submitted files that had been hacked in a ransomware attack – a 41 percent increase from 2018.

Executive Communications icon
Executive Communications

Daily Dive Email

Reuters: Mass Move to Work From Home in Coronavirus Crisis Creates Opening for Hackers: Cyber Experts

Hackers are capitalizing on the global shift to working & studying from home due to COVID-19. The shift to remote work opens up plenty of opportunities for hackers.

 
 
 

Sign up to receive complimentary IANS content.

These samples represent a selection of research available to our clients in the IANS Insights Portal. Please fill out the form below. Next, select which samples you’d like to receive, and we’ll send them to your email.

Submitted Loading animation
 

* Required Fields

Thank you for your interest in IANS content!

Please select which samples you'd like to receive, and we'll send them to your email.

What we do.

We deliver what CISOs and their teams need most: unbiased, practical advice; the ability to speak with professionals who understand their challenges; and peer interaction to keep their knowledge and skills fresh and up-to-date.

Decision Support

End-User Decision Support is our flagship offering delivered through an annual subscription service designed for CISOs and their teams. IANS connects you with independent experts and practitioners who have ‘been there, seen it, and done it,’ enabling you to accelerate your capabilities and make informed decisions.

Learn More

Consulting

We work with you to shape engagements and provision them with the right IANS Faculty experts. Your project will never be staffed with junior level consultants. Our expertise is built from hands-on experience. We staff your project with doers who recommend actions, and then help you take them.

Learn More

Events

Our events feature IANS Faculty members who offer a breadth of in-the-weeds advice and high-level guidance for the entire security team. Designed for you to engage with like-minded security professionals in a supportive environment, you’ll learn from a variety of industry approaches and use cases.

Learn More