Search IANS
Content Type
Date Range
Tools & Guides | Nov/9/2021
Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.
Blog | Nov/4/2021
IANS Faculty member Nicole Dove provides a detailed overview of the BISO (business information security officer) role and explains how it works to improve both business and security outcomes.
Blog | Oct/28/2021
Learn how to create ransomware tabletop exercises focused on executive responsibilities, including actions executives should take in preparation of, and in response to, a ransomware attack.
Blog | Oct/5/2021
Learn how to create an efficient enterprise architecture that can be maintained and support the business over time to help strategically align CIO, CTO and CISO priorities.
Blog | Sep/28/2021
Learn how to design a cyber threat intelligence framework with our workflow example and expert tips to ensure your CTI program is effective and actionable.
Blog | Mar/15/2022
Gain a better understanding of the different types of CISO reporting structures and examine reasons for having a CISO report to technical director instead of a chief information officer (CIO) or another C-level executive.
Tools & Guides | Aug/31/2021
Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.
Tools & Guides | Aug/25/2021
Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.
Blog | Aug/17/2021
Gain a better understanding of the IANS Faculty, our team of over 100+ information security practitioners at the core of all IANS' client offerings.
Blog | Aug/12/2021
Understand the requirements for and learn how to create an effective IAM program and operational structure.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.