Search IANS

Content Type
Date Range
Faculty

Ross Young has spent two decades at the forefront of cybersecurity, from CIA officer to enterprise CISO. He’s the co-host of CISO Tradecraft, creator of the OWASP Threat and Safeguard Matrix (TaSM), and a recognized leader who has served as CISO in Residence at Team8, CISO of Caterpillar Financial, instructor at Johns Hopkins University, and divisional CISO at Capital One. Ross also brings over a decade of frontline experience from the CIA, NSA, and the Federal Reserve Board.

Tools & Guides | Sep/10/2025

The 2025 Security Software and Services Benchmark Summary Report, jointly fielded by IANS and Artico Search, offers insights from over 600 CISOs and in-depth analysis into the current state of security software within enterprise security programs.

Event | Sep/25/2025
A good implementation plan can mean the difference between a successful tool/service purchase and shelfware. In this webinar, IANS Faculty offer key guidance, including: Involving the right people and earmarking the right resources Setting achievable project milestones, and knowing when implementation is over and usage/optimization begins Configuring the right metrics to ensure you gain value immediately and over time
Blog | Sep/2/2025
Setting up a strong GRC program is challenging. Learn key steps that will help establish a solid foundation for your organization’s program.
Blog | Aug/28/2025
IANS Research reviews the 12 high-level steps required for building a privacy program that meets the unique security goals of your organization and team.
Tools & Guides | Aug/26/2025
This checklist is designed to help teams strengthen insider threat programs and outlines practical steps across governance, access, monitoring, and response—enabling faster detection, stronger defenses, and reduced organizational risk.
Blog | Aug/26/2025
Examine the pros and cons of common CISO reporting structures and find tips for pursuing the right balance based on the needs and structure of your organization.
Event | Aug/28/2025
As the Cybersecurity Information Sharing Act (CISA) 2015 faces potential expiration next month, organizations risk a significant reduction in threat intelligence sharing. This session will detail what’s included in the law, the implications of its potential lapse and proactive steps CISOs can take to maintain information flow and collaboration in uncertain times.