InfoSec-Specific Executive Development for CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive labs to build you and your team's InfoSec skills
IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather
all members of the security function.
Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.
One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.
Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.
Hour-long interactive discussions examining hot topics in information security.
Register for this special session to understand common M365 security issues identified following nearly two dozen assessments conducted by IANS Faculty, Aaron Turner. Attendees will walk away with recommendations to harden their environment and help reduce their exposure to sophisticated attacks.
Aaron Turner is the Founder & CEO of Siriux Security, a SaaS posture management company which partners with IANS on M365 security consulting projects. He is also a member of the board and security advisor to HighSide and CTO of Integricell. Aaron is a long-serving member of the RSA Conference Program Committee, helping select educational content presented at the annual RSA Conference.
Security champion programs open lines of communication between security and the rest of the organization, leading to better support, accelerated alert cycles and stronger business/security alignment. This webinar will cover how to build one.
Tanya Janca, also
known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application
Security’. She is also the founder of We Hack Purple, an online learning
academy, community and podcast that revolves around teaching everyone to
create secure software. Tanya has been coding and working in IT for over twenty
years, won numerous awards, and has been everywhere from startups to public
service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats;
startup founder, pentester, CISO, AppSec Engineer, and software developer. She
is an award-winning public speaker, active blogger & streamer and has
delivered hundreds of talks and trainings on 6 continents. She values
diversity, inclusion and kindness, which shines through in her countless
Which threats and opportunities will consume our attention in the coming year? This webinar recaps the biggest changes of the past year and looks ahead to what IANS sees emerging in 2022.
Dave is the Founder and Principal Consultant with Voodoo Security, an
information security consulting firm with broad expertise. He is also a
Senior Instructor, Analyst, and Course Author for the SANS Institute and
a VMware vExpert with extensive experience designing and configuring
secure virtualized infrastructures. In addition, Dave has served as
Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group
and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of
organizations in the areas of security, regulatory compliance, network
architecture, and engineering. He has also worked as a security
architect, analyst, and manager for several Fortune 500 companies.
Gal Shpantzer has been a full-time security consultant since the year 2000, providing (mostly good) advice to early-stage tech startups, security vendors, Ivy League universities, non-profits, and Fortune 50 clients. Gal owns and operates a boutique consultancy focused on vCISO and Observability Pipeline services that enable modern, scalable, user-friendly, auditable, and forensically ready security programs. Gal leads security programs and projects that empower business and technical leadership to prevent, detect and respond to security incidents, including threats to confidentiality (sophisticated IP theft) and availability (DDoS, ransomware).