November 2, 2018 | Tools & Templates | Security Policies and Strategy
This template is designed to be used to evaluate vendors performing a security program maturity assessment.
What are the components of a secure MDM strategy? In this Ask-an-Expert written response, IANS Faculty Aaron Turner offers recommendations on devices, management tools and policies to ensure mobile devices remain secure over the long term.
What statements or phrases can help increase adoption of tools like Thycotic Secret Server? In this Viewpoints report, IANS Faculty Josh More, Adam Shostack and Jason Gillam offer some tried-and-true strategies.
With the information security workforce shortage projected to reach 2-3 million over the next few years, organizations are putting a greater emphasis on their recruiting process to better fill out their security teams. Use these sample infosec job descriptions to set the foundation for role expectations and attract the most highly qualified professionals to your organization.