Content Type
Date Range
Blog | May/15/2025
Choosing a security vendor isn’t just a purchase—it’s a strategic move. CISOs who set clear expectations, run smart PoCs, and demand transparency build stronger, long-term security partnerships.
Event | May/16/2025
IANS Faculty Jake Williams will discuss Coinbase’s recent disclosure of a data breach, in which hackers stole customer data & are demanding a $20m ransom to not leak it. Coinbase – which stated it has not paid the ransom – said the stolen data includes customer names, addresses, phone numbers, email addresses, masked SSNs, govt IDs and passports. Jake will discuss what we know about the breach, what steps to take and what CISOs should be communicating to their executives.
Tools & Guides | May/14/2025
This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
Tools & Guides | May/14/2025
This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Faculty

Munish Walther-Puri is a security strategist and risk advisor specializing in cybersecurity, critical infrastructure, and geopolitics. He served as the inaugural Director of Cyber Risk for New York City Cyber Command. His expertise spans cyber strategy, supply chain security, state and local cybersecurity, critical infrastructure incidents, and geopolitical analysis. He has worked with startups, financial institutions, and think tanks, focusing on the intersection of cyber risk, technology, intelligence, and national security. Munish is an adjunct fellow at the Institute for Security & Technology and adjunct faculty member at NYU CGA.

Blog | May/8/2025
Access key tech industry data sets from IANS and Artico Search’s 2025 Compensation and Budget for CISOs in Tech Report. Gain valuable insights on tech sector budget trends, CISO compensation, and the drivers behind them.
Blog | May/6/2025
Learn how IANS helped our client select the right PAM product that required fewer resources and minimal licensing ensuring a faster time-to-value deployment resulting in substantial cost savings.
Tools & Guides | May/6/2025
This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Tools & Guides | May/6/2025
Join IANS Faculty Dave Shackleford and Shannon Lietz as they discuss prominent evens in cybersecurity for the week of April 30th, 2025
Tools & Guides | Apr/29/2025
This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.