Search IANS

Content Type
Date Range
Tools & Guides | May/21/2025

This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Tools & Guides | May/20/2025
This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.  
Event | May/16/2025
IANS Faculty Jake Williams will discuss Coinbase’s recent disclosure of a data breach, in which hackers stole customer data & are demanding a $20m ransom to not leak it. Coinbase – which stated it has not paid the ransom – said the stolen data includes customer names, addresses, phone numbers, email addresses, masked SSNs, govt IDs and passports. Jake will discuss what we know about the breach, what steps to take and what CISOs should be communicating to their executives.
Tools & Guides | May/14/2025
This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
Tools & Guides | May/14/2025
This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Faculty

Munish Walther-Puri is a security strategist and risk advisor specializing in cybersecurity, critical infrastructure, and geopolitics. He served as the inaugural Director of Cyber Risk for New York City Cyber Command. His expertise spans cyber strategy, supply chain security, state and local cybersecurity, critical infrastructure incidents, and geopolitical analysis. He has worked with startups, financial institutions, and think tanks, focusing on the intersection of cyber risk, technology, intelligence, and national security. Munish is an adjunct fellow at the Institute for Security & Technology and adjunct faculty member at NYU CGA.

Tools & Guides | May/6/2025
This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Tools & Guides | May/6/2025
Join IANS Faculty Dave Shackleford and Shannon Lietz as they discuss prominent evens in cybersecurity for the week of April 30th, 2025
Tools & Guides | Apr/29/2025
This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.
Blog | Apr/28/2025
Without AI governance, the privacy and security of a business’ information can be vulnerable and lacks visibility into the data that is being shared with third-parties. It’s impossible to see whether data is being used by AI or if AI is being misused. To make order out of this chaos, it’s key to develop and implement a formal AI governance program.