Content Type
Date Range
Blog | Jul/15/2025
Learn how to enable and tune a wide variety of Microsoft Defender for Endpoint settings for Windows workstations and servers using this handy checklist.
Faculty
Chad Holmes is a cybersecurity strategist with over 20 years of experience helping organizations protect critical systems, enable secure development, and build resilient teams. With deep expertise in healthcare security, application security, and hands-on training, he combines technical insight with business acumen to drive meaningful outcomes. Whether guiding CISOs through strategic decisions or mentoring the next generation of security professionals, Chad is passionate about developing talent and making security a catalyst for innovation.
Blog | Jul/10/2025
Gain an understanding of the key components of an effective executive-level InfoSec dashboard along with tips for including concrete actionable data.
Event | Aug/26/2025
AI is putting legacy data governance processes under a microscope. In response, a number of key frameworks are emerging to provide a foundation for orgs to use as a starting point. This session dives into the strategic and tactical steps to take to improve AI governance, regardless of which framework you choose, and provides a rundown of some of the most prominent AI governance frameworks.
Tools & Guides | Jul/8/2025
Agentic AI, autonomous AI that performs tasks and makes decisions independently, can drastically increase operational efficiencies but significantly complicates security and compliance. This guide outlines a clear roadmap and practical guardrails to help CISOs and security leaders as they plan for adoption of Agentic AI.
Blog | Jul/8/2025
With expert guidance from IANS, the company achieved compliance, launched a new business line, and realized $1.7 million in cost savings—delivering secure operations without exceeding budget.
Event | Aug/12/2025
Most organizations today have a vast array of privileged non-human accounts in use – with some research enumerating that for each human identity, there are an average of 92 NHIs. Provisioning and entitlements of NHIs is complex, as we see excessive permissions and secret mismanagement of these accounts commonplace. Agentic AI and Robot Process Automation (RPA) accounts further complicate the situation by expanding the use cases for NHIs. With many high-profile breaches in the past year stemming from NHI attacks and the use of NHIs continuing to exponentially grow – whether in your cloud environment or from the adoption of AI agents – CISOs and security leaders must review the architectural design, identity lifecycle and governance, and controls necessary to meet the specific requirements of these often poorly managed but highly privileged accounts.
Event | Aug/19/2025
The buzz around Agentic AI – the latest form of AI systems designed to autonomously make decisions and act – is rampant. As security leaders grapple to understand the nuances of this next wave of AI excitement, there are many considerations to take into account to determine if, where and how to experiment and accelerate its use within your environment. In this symposium, IANS Faculty Jake Williams cuts through the noise and shares practical insights and recommendations to aid your understanding of the technology, its risks and guardrails for adoption within your enterprise.
Tools & Guides | Jul/1/2025
This IANS guide offers 10 concise, expert-backed tips to help security leaders present with clarity, confidence, and business relevance. Learn how to frame cyber risk in business terms, handle tough questions, and avoid common pitfalls—so you can deliver high-impact board presentations that drive alignment and action.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.