Content Type
Date Range
Blog | May/29/2025
Large enterprise CISOs are managing multimillion-dollar security budgets while navigating increasingly complex roles. Despite high compensation many CISOs report low job satisfaction—leading a majority to remain open to new opportunities.
Blog | May/28/2025
IANS Senior Directors of Research Nick Kakolowski and Gina Glendening reflect on key infosec takeaways and trends they saw at RSAC Conference 2025.
Tools & Guides | May/21/2025

This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Tools & Guides | May/20/2025
This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.  
Blog | May/15/2025
Choosing a security vendor isn’t just a purchase—it’s a strategic move. CISOs who set clear expectations, run smart PoCs, and demand transparency build stronger, long-term security partnerships.
Event | May/16/2025
IANS Faculty Jake Williams will discuss Coinbase’s recent disclosure of a data breach, in which hackers stole customer data & are demanding a $20m ransom to not leak it. Coinbase – which stated it has not paid the ransom – said the stolen data includes customer names, addresses, phone numbers, email addresses, masked SSNs, govt IDs and passports. Jake will discuss what we know about the breach, what steps to take and what CISOs should be communicating to their executives.
Tools & Guides | May/14/2025
This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
Tools & Guides | May/14/2025
This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Faculty

Munish Walther-Puri is a security strategist and risk advisor specializing in cybersecurity, critical infrastructure, and geopolitics. He served as the inaugural Director of Cyber Risk for New York City Cyber Command. His expertise spans cyber strategy, supply chain security, state and local cybersecurity, critical infrastructure incidents, and geopolitical analysis. He has worked with startups, financial institutions, and think tanks, focusing on the intersection of cyber risk, technology, intelligence, and national security. Munish is an adjunct fellow at the Institute for Security & Technology and adjunct faculty member at NYU CGA.

Blog | May/8/2025
Access key tech industry data sets from IANS and Artico Search’s 2025 Compensation and Budget for CISOs in Tech Report. Gain valuable insights on tech sector budget trends, CISO compensation, and the drivers behind them.