Ask-An-Expert

Through our Ask-An-Expert service, you can access a virtual team of security experts who act as an extension of your team and provide you with the knowledge, skills, and expertise you need to solve challenges as they arise.

You'll have the ability to submit unlimited Ask-An-Expert requests on topics and issues critical to your information security needs. Our Client Services team evaluates your request and, based on the question and your situation quickly engages the right expert from the IANS Faculty to provide counsel. Ask-An-Expert answers can be delivered as a written report, or through a one-on-one phone call with the IANS Faculty Member.

Sample Ask-An-Expert Sessions

A security analyst at a small financial services firm believes it is increasingly important to have strong detection methods in place due to an acceptance that prevention methods will, at times, fail. The security team wants to expand its detection capabilities on a host beyond traditional monitoring solutions leveraging known bad signatures. The security analyst is considering the value of cataloging all running processes across the network, and would like to know:

  • Would collecting hash values of all running processes from systems in an environment and comparing them to a catalogue of known good processes be an effective method to confidently detect malware?

Read the Expert Response

The security team for a large health insurer wants to start monitoring the web to alert it if/when the company’s sensitive customer data shows up on unapproved sites or the dark web. The issue came to light shortly after an internal incident response (IR) tabletop exercise highlighted this deficiency in its process. The team would like not only to be alerted when stolen data is found, but also be able to quickly suppress such data, before it is discovered by clients or publicized by the media. Specifically, the team asks:

  • If our company is breached and hackers put our stolen data on the web, how can we locate it and how can we ensure it gets taken down quickly?
  • Do any firms specialize in suppressing breached protected health information (PHI) or personally identifiable information (PII)?

Read the Expert Response

Have a question for our infosec experts?

Request a session

IANS Clients:
Schedule your Ask-An-Expert


Learn More


If you have a question, comment, or would like to learn more about our services, please use this form to let us know what you’re looking for. A member of the IANS team will be in touch soon.