Cybersecurity Tools & Guides
Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.
Threat Intelligence Policy and Procedure
This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.

CISA SaaS Attacks Warning, Lumma Stealer Takedown, Hackers Claim Coca-Cola Breaches


Webinar Replay: Make the Case for Resources as Budgets Tighten in Healthcare

2025 Compensation and Budget for CISOs in Large Enterprises
Application Pen Test Program Framework
This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Zero Trust Maturity Model (ZTMM) Controls Guide




Incident Briefing: Coinbase Discloses Breach of Customer Data
On May 15, 2025, the cryptocurrency exchange Coinbase disclosed that it had been the victim of an extortion attempt following a breach of customer data. Coinbase stated that prior to receiving the extortion demand, it had independently discovered unauthorized access of customer data by “overseas support agents” using internal monitoring systems.

PAM Tech Essentials

Cybersecurity Strategy Template
