Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 75
Threats and Vulnerabilities Threat Intelligence and Modeling

Threat Intelligence Policy and Procedure

This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.

shannon-leitz
Shannon Lietz
Tech Briefing Summary Incident Response and Recovery

CISA SaaS Attacks Warning, Lumma Stealer Takedown, Hackers Claim Coca-Cola Breaches

Access a summary of our recent Tech Briefing that reveals urgent cyber threats—including a zero-day exploit targeting Commvault and the Lumma Stealer malware takedown—and provides practical guidance to help security teams strengthen defenses and stay ahead. 
shannon-leitz
wolfgang-goerlich
Shannon Lietz
Wolfgang Goerlich
Webinar Replay Management and Leadership

Webinar Replay: Make the Case for Resources as Budgets Tighten in Healthcare

This industry-specific webinar with IANS Faculty member Steve Martano is designed to help you contextualize your program’s resourcing relative to your peers and justify your spend.
Steven Martano
Report Management and Leadership

2025 Compensation and Budget for CISOs in Large Enterprises

Download the definitive benchmark report for CISOs at large enterprises ($1B+ revenue) and gain exclusive insights into compensation, budget allocation, scope creep, and more.
IANS Research
Tools and Templates Threats and Vulnerabilities

Application Pen Test Program Framework

This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Jason Gillam- IANS Faculty
Jason Gillam
Guide Networking

Zero Trust Maturity Model (ZTMM) Controls Guide

This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.  
wolfgang-goerlich
Alex Sharpe- IANS Faculty
jennifer-minella
Wolfgang Goerlich
Jason Garbis
Alex Sharpe
Jennifer Minella
Briefing Replay Management and Leadership

Incident Briefing: Coinbase Discloses Breach of Customer Data

On May 15, 2025, the cryptocurrency exchange Coinbase disclosed that it had been the victim of an extortion attempt following a breach of customer data. Coinbase stated that prior to receiving the extortion demand, it had independently discovered unauthorized access of customer data by “overseas support agents” using internal monitoring systems.

jake-williams
Jake Williams
Guide Vendor Assessment

PAM Tech Essentials

This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
idan-shoham
Idan Shoham
Tools and Templates Security Policies and Strategy

Cybersecurity Strategy Template

This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Paul Connelly