Search IANS

Content Type
Date Range
Tools & Guides | Jul/29/2025
This IANS guide shows how to design cybersecurity governance dashboards that deliver strategic value to leadership while providing operational clarity to teams. Learn how to highlight the right metrics, avoid common design missteps, and communicate risk with greater impact.
Faculty

Paul Snyder is a Director of Information Security GRC with experience leading global teams of cybersecurity professionals in healthcare, manufacturing and financial services verticals. Paul brings a unique blend of experience leading Information Security GRC, Engineering and Risk Advisory teams, enabling him to translate complex technical challenges into strategic solutions that resonate with executive leadership. From guiding strategic risk initiatives to streamlining operations through data-driven insights, Paul brings both vision and hands-on expertise to securing today’s digital landscape.

Event | Aug/14/2025
A Hiring-Process Penetration Test is an end-to-end, red-teaming service that stress-tests recruiters, tooling, and SOPs with the same tradecraft adversaries use. Live-fire simulations expose policy gaps, social-engineering weak points and technical bypasses across applicant tracking, identity verification and onboarding.
Blog | Jul/22/2025
CISOs must proactively adopt clear governance, identity management, and operational controls for agentic AI to safely utilize its benefits without exposing their organizations to critical risks.
Tools & Guides | Jul/17/2025
Access a summary of our July 17th Tech Briefing that dives into three major developments shaking up the security landscape. Download now for expert insights, actionable next steps, and a deeper dive into each story—all in one concise PDF. 
Tools & Guides | Jul/15/2025
This guide is a sample from the IANS Vendor Assessment Community that outlines when and why security leaders should consider consolidating tools onto the CrowdStrike Falcon® Platform. Learn how consolidation can simplify operations, reduce vendor fatigue, and enhance visibility without sacrificing protection. 
Blog | Jul/15/2025
Learn how to enable and tune a wide variety of Microsoft Defender for Endpoint settings for Windows workstations and servers using this handy checklist.
Faculty

Chad Holmes is a cybersecurity strategist with over 20 years of experience helping organizations protect critical systems, enable secure development, and build resilient teams. With deep expertise in healthcare security, application security, and hands-on training, he combines technical insight with business acumen to drive meaningful outcomes. Whether guiding CISOs through strategic decisions or mentoring the next generation of security professionals, Chad is passionate about developing talent and making security a catalyst for innovation.

Blog | Jul/10/2025
Gain an understanding of the key components of an effective executive-level InfoSec dashboard along with tips for including concrete actionable data.