Content Type
Date Range
Tools & Guides | May/14/2025
This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
Tools & Guides | May/14/2025
This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Faculty
Munish Walther-Puri is a security strategist and risk advisor specializing in cybersecurity, critical infrastructure, and geopolitics. He served as the inaugural Director of Cyber Risk for New York City Cyber Command. His expertise spans cyber strategy, supply chain security, state and local cybersecurity, critical infrastructure incidents, and geopolitical analysis. He has worked with startups, financial institutions, and think tanks, focusing on the intersection of cyber risk, technology, intelligence, and national security. Munish is an adjunct fellow at the Institute for Security & Technology and adjunct faculty member at NYU CGA.
Blog | May/8/2025
Access key tech industry data sets from IANS and Artico Search’s 2025 Compensation and Budget for CISOs in Tech Report. Gain valuable insights on tech sector budget trends, CISO compensation, and the drivers behind them.
Blog | May/6/2025
Learn how IANS helped our client select the right PAM product that required fewer resources and minimal licensing ensuring a faster time-to-value deployment resulting in substantial cost savings.
Tools & Guides | May/6/2025
This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Tools & Guides | May/6/2025
Join IANS Faculty Dave Shackleford and Shannon Lietz as they discuss prominent evens in cybersecurity for the week of April 30th, 2025
Tools & Guides | Apr/29/2025
This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.
Blog | Apr/28/2025
Without AI governance, the privacy and security of a business’ information can be vulnerable and lacks visibility into the data that is being shared with third-parties. It’s impossible to see whether data is being used by AI or if AI is being misused. To make order out of this chaos, it’s key to develop and implement a formal AI governance program.
Blog | Apr/24/2025
Third-party risk should be a top priority for security leaders, as organizations are increasingly vulnerable to supply chain attacks and cloud threats. Here, we examine key third-party risks and how security leaders can mitigate them.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.