Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 71
Tools and Templates Threats and Vulnerabilities

Application Pen Test Program Framework

This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Jason Gillam- IANS Faculty
Jason Gillam
Guide Networking

Zero Trust Maturity Model (ZTMM) Controls Guide

This free guide builds on CISA’s Zero Trust Maturity Model (ZTMM), offering practical controls, maturity objectives, and evidence aligned with NIST 800-171 to help you implement, evaluate and mature zero trust capabilities.  
wolfgang-goerlich
Alex Sharpe- IANS Faculty
jennifer-minella
Wolfgang Goerlich
Jason Garbis
Alex Sharpe
Jennifer Minella
Briefing Replay Management and Leadership

Incident Briefing: Coinbase Discloses Breach of Customer Data

On May 15, 2025, the cryptocurrency exchange Coinbase disclosed that it had been the victim of an extortion attempt following a breach of customer data. Coinbase stated that prior to receiving the extortion demand, it had independently discovered unauthorized access of customer data by “overseas support agents” using internal monitoring systems.

jake-williams
Jake Williams
Guide Vendor Assessment

PAM Tech Essentials

This PAM Tech Essentials guide helps you understand core PAM product categories and management strategies, assess your organization's need for privileged access management, and determine the right level of investment based on your size and maturity.
idan-shoham
Idan Shoham
Tools and Templates Security Policies and Strategy

Cybersecurity Strategy Template

This cybersecurity strategy template helps organizations align daily security efforts with long-term goals. It offers strategic guidance, clear direction, stakeholder alignment, and a customizable format to support a mature and focused cybersecurity program.
Paul Connelly
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Newly Discovered Weaknesses Put Web-Based Authentication at Risk

In this briefing, Jake Williams details a newly disclosed vulnerability class has emerged caused by a weakness in the underlying standards for OAuth 2.0, OpenID Connect and FAPI, why security teams should be prioritizing this and provides steps to take, specifically from a third-party risk management perspective.

jake-williams
Jake Williams
Guide Vendor Assessment

PAM Market Guide

This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Nick Hunt
wolfgang-goerlich
Nick Hunt
Wolfgang Goerlich
Tools and Templates Team Structure and Management

Cybersecurity Job Description Templates

This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.
IANS Research
Tools and Templates Vendor Management

AI Vendor Questionnaire

Uncover risks and ensure responsible AI use across your vendor landscape with this comprehensive questionnaire designed to assess the security, privacy, compliance, and ethical standards of third-party AI tools.
Jason Robbins