Content Type
Date Range
Page
Handle your Pen Testing, Assessment, and Incident Response needs with help from expert cybersecurity practitioners and IANS project managers.
Page
Leverage IANs to integrate continuous assessments into your cybersecurity strategy while conducting a comprehensive review of your security program.
Page
Identify weaknesses in your cybersecurity architecture and evaluate how well your controls block threats or mitigate damage with IANS' pen testing. 
Page
Tabletop exercises that provide a practical and effective way for organizations to actively test and improve their incident response programs.
Page
Unlock robust cloud security with IANS’ comprehensive program assessment, designed to identify risks across technical controls, governance, and staffing.
Page
Identify weaknesses in your cybersecurity architecture and evaluate how well your controls block threats or mitigate damage with IANS' pen testing.
Page
IANS is committed to securely managing client data and individual privacy, as well as how our robust internal security measures are enforced.
Tools & Guides | Dec/3/2024

Step three in a three-part series, this checklist breaks down factors for product owners to identify sensitive data, evaluate roles and map roles to data access.

Faculty

Tom is the Senior Director of Professional Services at Snyk, where he leads a team delivering solutions to secure software development. Previously, he served as Vice President of Consulting at Bishop Fox, a globally recognized offensive security firm, and as Senior Manager of Penetration Testing at Veracode. Over his career, Tom has held diverse roles as a penetration tester, security consultant, and leader of vulnerability management and security awareness programs. Tom has over 24 years of experience in information technology, including 19 years specializing in cybersecurity and offensive security.

Faculty

Rachel Bierner is the Co-founder and CEO of Qubric Security, a cybersecurity consulting firm that enables secure organizational growth and resilience for its clients. She has held leadership roles in cloud security, cybersecurity strategic planning, technology delivery, and operations at two of the top three U.S. financial institutions. She also served as a management consultant at a "big 4" global consulting firm, where she led software configuration and development teams for clients that ranged from technology start-ups to multinational enterprises.