Content Type
Date Range
Blog | Aug/10/2023
Learn how to enable and tune a wide variety of Microsoft Defender for Endpoint settings for Windows workstations and servers using this handy checklist.
Page
Understand the security implications you need to be aware of and responsible options for MS Copilot usage should you choose to deploy it. In this talk, we'll cover the MS Copilot landscape, abuse cases that the community is concerned about, setting a foundation for a responsible and well-architected environment that supports safe usage, and more.
Blog | Aug/1/2023
Gain an understanding of deployment-based and risk-based metrics classes along with how to measure, map and communicate security metrics that resonate with leadership.
Tools & Guides | Jul/27/2023
Use the 2023 Cloud Security Maturity Benchmark Report developed by IANS and Securosis to help assess -and improve -your cloud security program.
Blog | Jul/25/2023
Learn how to create security metrics that resonate with the board and senior leadership using an efficient cyber-risk quantification (CRQ) process.
Blog | Jul/18/2023
Find key insights and actionable guidance for CISOs exploring the prospect of pursuing board positions in three steps to access and refine soft skills, experience gaps and their brand.
Blog | Jul/13/2023
IANS Faculty member, Tanya Janca discusses pros and cons of DAST and SAST tools and provides guidance on how to select the right tools for your needs.
Blog | Jul/11/2023
Unlock the secrets to maturing your risk management function by effectively identifying value at risk, assessing threats, and implementing high-value controls. This comprehensive guide provides insights and strategies for aligning cybersecurity with business priorities.
Blog | Jul/6/2023
Understand how LLMs like ChatGPT lack adequate protections for data, content, and intellectual property. Find guidance for building LLMs policy and security controls from Aaron Turner, IANS Faculty.