Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 1-9 of 79
Briefing Replay Management and Leadership

Emerging Issue Briefing Replay: Imposter North Korean Remote Workers Infiltrating Western Companies

North Korean workers have infiltrated hundreds of Western companies (including cybersecurity firms and Fortune 500 orgs) posing as remote IT staff.

george-gerchow
George Gerchow
Report Management and Leadership

2025 Compensation and Budget for CISOs in the Small and Middle Market

Small and mid-sized organizations face unique cybersecurity challenges. Get actionable benchmarks and expert recommendations in this report based on survey data of nearly 400 CISOs from small and middle market organizations (under $1B in revenue).

IANS Research
Webinar Replay Management and Leadership

Webinar Replay: Securing Agentic AI: Understand Its Potential and Risks in the Real World

Join IANS Faculty Ashish Rajan as he shares practical insights and recommendations on the next evolution of AI to help you build your roadmap and securely accelerate its use.
Ashish Rajan
Ashish Rajan
Guide Vendor Assessment

PAM Implementation Playbook

The PAM Implementation Playbook is designed to help organizations streamline and secure privileged access across their IT environments. This actionable guide delivers a 5–8-month roadmap to help organizations take control of privileged access, reduce risk, and accelerate compliance.
dave-shackleford
Dave Shackleford
Threats and Vulnerabilities Threat Intelligence and Modeling

Threat Intelligence Policy and Procedure

This template offers a structured framework for organizations to develop a robust threat intelligence program that will proactively identify, analyze, and respond to cyber threats.

shannon-leitz
Shannon Lietz
Tech Briefing Summary Incident Response and Recovery

CISA SaaS Attacks Warning, Lumma Stealer Takedown, Hackers Claim Coca-Cola Breaches

Access a summary of our recent Tech Briefing that reveals urgent cyber threats—including a zero-day exploit targeting Commvault and the Lumma Stealer malware takedown—and provides practical guidance to help security teams strengthen defenses and stay ahead. 
shannon-leitz
wolfgang-goerlich
Shannon Lietz
Wolfgang Goerlich
Webinar Replay Management and Leadership

Webinar Replay: Make the Case for Resources as Budgets Tighten in Healthcare

This industry-specific webinar with IANS Faculty member Steve Martano is designed to help you contextualize your program’s resourcing relative to your peers and justify your spend.
Steven Martano
Report Management and Leadership

2025 Compensation and Budget for CISOs in Large Enterprises

Download the definitive benchmark report for CISOs at large enterprises ($1B+ revenue) and gain exclusive insights into compensation, budget allocation, scope creep, and more.
IANS Research
Tools and Templates Threats and Vulnerabilities

Application Pen Test Program Framework

This document outlines a framework for establishing an application pen testing program. It serves as a guide for application security managers, highlighting the essential components and documentation required to develop an effective program.

Jason Gillam- IANS Faculty
Jason Gillam