Not an IANS client?

Experience the Ask-An-Expert Service


We invite prospective clients to evaluate IANS' Decision Support service; schedule a sample Ask-An-Expert session with a member of our Faculty.

In this session, we will demonstrate how IANS can help your team tackle a specific challenge or get smart on a topic important to you.

Submit this form to request a session that aligns with your team’s specific requirements. Please provide an overview of the topic you'd like to discuss, and (if applicable) the name of a specific member of the Faculty. A member of our team will reach out to discuss your request and confirm an Ask-An-Expert session.

Already an IANS client? Login here.



QUESTION
We would like to discuss 802.1x implementation best practices with IANS Faculty.

RELATED RESEARCH
Using 802.1x and Certificates for Device Authentication vs. Profiling


QUESTION
We are looking for information regarding SIEM data collection/analysis best practices.

RELATED RESEARCH
Anchor Your Security With a Well-honed SIEM Strategy


QUESTION
We are currently hiring in two countries and want to know how to make good, timely information security hires.

RELATED RESEARCH
Where Is All the Talent?


QUESTION
We are looking to evaluate vendors in the endpoint security space, including Bit9, FireEye and Tanium, and would like to know the pros and cons of each.

RELATED RESEARCH
Designing the Ideal Endpoint Security Solution


QUESTION
We would like to speak with IANS Faculty to understand security tool design/collapsing/simplification strategies as we move toward a software-defined networking model for our new data centers.

RELATED RESEARCH
SDN? Get Ready but Don’t Pull the Trigger Yet


QUESTION
We would like to discuss our incident response processes with IANS Faculty. We feel that our IR processes are mature as of today, but we want to improve communication, better involve other areas of the business, etc. What tabletop exercises/mock scenarios can we use to effectively test our processes?

RELATED RESEARCH
Challenging Your Incident Response Process


QUESTION
We would like to speak with IANS Faculty regarding hunt teaming/red team exercises.

RELATED RESEARCH
Tips for Holding a Successful Company-wide Red Team/Blue Team Exercise


QUESTION
Can IANS offer any insight into best practices for building a metrics and reporting program from scratch?

RELATED RESEARCH
Creating Meaningful, Actionable IT Security Metrics


QUESTION
We would like to speak with IANS Faculty regarding vendor management. Specifically, what are best practices for ensuring that the vendor is properly securing data in the cloud? What are contract considerations to ensure proper protection?

RELATED RESEARCH
Streamlining the Cloud Service Provider Contract Process


QUESTION
We would like to discuss the EU Data Privacy space with IANS Faculty. From a regulatory/compliance perspective, what do the new laws look like? What should we be aware of? How can we better understand the new requirements and how are other firms addressing them?

RELATED RESEARCH
Prep Now for the EU's New General Data Protection Regulation or Pay Later


QUESTION
We would like to discuss cloud access security brokers (CASBs) with IANS Faculty. We are currently looking at different products like Adallom, Skyhigh Networks and Netskope and would like to gain insight into the primary benefits/downsides to each. Are there any implementation 'gotchas' we should consider? From an architectural standpoint, how do they stack up?

RELATED RESEARCH
Best Practices for Selecting, Managing a CASB


QUESTION
We have been tasked with developing a template for embedding security into the SDLC and would like to speak with IANS Faculty. The dev team is working on building an app services catalog and using MS visual studios for creating a "code repository."

RELATED RESEARCH
Security Testing in the SDLC: A Strategy Guide


QUESTION
We would like to speak with IANS Faculty regarding endpoint protection. Specifically, how can we quickly identify malicious activity/malware and determine where in the environment it is originating from?

RELATED RESEARCH
Detailing Advanced Detection Techniques


QUESTION
We are in the process of selecting and procuring a SIEM and would like to speak with IANS Faculty around best practices. We are considering QRadar, SumoLogic and Splunk. What are the pros and cons of each vendor? How should we be evaluating SIEM vendors?

RELATED RESEARCH
Best Practices for Managing a SIEM


QUESTION
We are looking at e-discovery tools and would like some guidance from IANS Faculty. Can IANS provide guidance on who the players are in this space and how we should be evaluating them?

RELATED RESEARCH
Evaluating E-Discovery Tools


QUESTION
We are establishing a threat hunting process and would like to speak with IANS Faculty to understand best practices.

RELATED RESEARCH
Recognizing a Slow Burn: Tips for Uncovering Slow, Stealthy Malware (Webinar Replay/Slides)


QUESTION
We are putting together some guidelines for our users traveling to China and other high-risk international locations. Can IANS Faculty offer some feedback on additional areas and topics we should be including? One specific area we would like to discuss is the use of MiFi.

RELATED RESEARCH
Mitigating Security Risks for Traveling Employees


QUESTION
We would like to discuss the encryption space with IANS Faculty. How are companies dealing with the shift away from RSA key exchange? How are organizations dealing with education on encryption?

RELATED RESEARCH
Encryption 101: When to Apply Encryption


QUESTION
Can IANS provide relevant content around vendor risk management?

RELATED RESEARCH
Maturing Vendor Technology Risk Management