Not an IANS client?

Experience the Ask-An-Expert Service


We invite prospective clients to evaluate IANS' Decision Support service; schedule a sample Ask-An-Expert session with a member of our Faculty.

In this session, we will demonstrate how IANS can help your team tackle a specific challenge or get smart on a topic important to you.

Submit this form to request a session that aligns with your team’s specific requirements. Please provide an overview of the topic you'd like to discuss, and (if applicable) the name of a specific member of the Faculty. A member of our team will reach out to discuss your request and confirm an Ask-An-Expert session.

Already an IANS client? Login here.



QUESTION
What is the best way to create policies, procedures and standards in the cloud?

RELATED RESEARCH
Create a Practical, Scalable Cloud Policy


QUESTION
What is the purpose of unified data management (UDM)? What are its advantages and disadvantages?

RELATED RESEARCH
Unified Data Management (UDM): A Primer


QUESTION
What is the current GRC vendor landscape and what are the pros and cons of specific vendors?

RELATED RESEARCH
GRC Alternatives: Evaluating the Vendor Landscape


QUESTION
What is the recommended workflow for setting up an asset inventory and does IANS recommend any specific toolsets?

RELATED RESEARCH
Create a Workable Asset Inventory


QUESTION
What makes phishing campaigns valuable and does IANS have any stats to support the effectiveness of them?

RELATED RESEARCH
Defend Your Internal Phishing Campaign to Upper Management


QUESTION
What responsibilities fall under security vs. privacy? What functions fall between the two? 

RELATED RESEARCH
Security vs. Privacy: Who Does What?


QUESTION
How many threat feeds is too many and what types of data do effective threat feeds provide?

RELATED RESEARCH
Get Your Arms Around Threat Intelligence


QUESTION
What are realistic goals for the SOC’s first year of operation and what metrics should we track? 

RELATED RESEARCH
SOC Year 1: Set Realistic Expectations


QUESTION
How do Level 1 PCI-compliant organizations ensure they have the right remediation efforts in place following a penetration test?

RELATED RESEARCH
Meet PCI Standards for Penetration Testing


QUESTION
What are the best practices for deploying a privileged user management (PUM) program?

RELATED RESEARCH
Deploy an Effective Privileged User Management (PUM) Program


QUESTION
Can IANS step us through the process of creating security metrics, KPIs and a dashboard?

RELATED RESEARCH
Tell Security’s Story With the Right Metrics and KPIs


QUESTION
What are the top best practices for securing AWS?

RELATED RESEARCH
12 Best Practices for Securing AWS


QUESTION
What should be our primary security considerations during an M&A process?

RELATED RESEARCH
M&A Playbook: Merging Domains in the Cloud


QUESTION
How should we develop and implement a workable data classification policy?

RELATED RESEARCH
Data Classification: Design for the Human, Enforce with Technology


QUESTION
What are the 10 most common vulnerabilities found by penetration testers?

RELATED RESEARCH
Top 10 Ways Penetration Testers Break Into Organizations