Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Not an IANS client?

Interested in what’s included in the Insights Portal and how to find what you need? Watch our Product Overview and Technical Demo below!

Welcome Image
Technical Image
Download Sample Content

Are you an existing client?

If you already have credentials, sign in below.

Selected Filters:



Filter Options: 
  • Product: IANS content served in various formats (i.e. Ask-An-Expert Writeups, Faculty Reports, *Content Aggregator)
    • *Content Aggregator: Third-party content formatted in ready-to-use slides for presentations to the C-suite and lines of business
      • Single Slides: PowerPoint slides including speaker notes
      • Compilations: Collections of single slides on specific information security topics
      • Executive Briefings: Topical slides with an added viewpoint from the IANS Faculty
      • Icon Library: A collection of cybersecurity themed icons ready to use in slideshows
  • Topic: Primary and secondary IANS taxonomies (i.e. Cloud Computing, Infrastructure, Management & Leadership)
  • Author: Creator of a piece of content (i.e. particular IANS Faculty member)
Topic Guides icon
Pinned Topic Guides

COVID-19 and InfoSec: What You Need to Know

The ramifications of the novel coronavirus  COVID-19  are being felt throughout the business and information security communities. Here we offer a compilation of the latest IANS research to help you stay ahead of this fast-evolving situation and keep your staff and businesses safe and productive.

Tools & Templates icon
Tools & Templates

Ransomware Preparation and Response Checklist (Updated)

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

Create a Workable Security Services Catalog

Creating a workable catalog requires strong communication with business units to ensure security services contained in the catalog match up directly with user needs, now and over time. This report offers step-by-step guidance for how to build one.

Ask-An-Expert Writeups icon
Ask-An-Expert Writeups

TSAs: What to Include and What to Watch Out for

In this report, we detail what should be included in a workable transitional service agreement (TSA) and offer tips for avoiding some common pitfalls.

Content Aggregator icon
Content Aggregator

IANS Cybersecurity Icon Library (Updated Q2 2020)

A collection of cybersecurity themed icons ready to use in your slideshows. The icons in this library were developed by IANS Research for use in Content Aggregator slides and other documents. As a subscriber to the Content Aggregator, you have access to use these icons in your security documents and presentations.

Faculty Reports icon
Faculty Reports

Create a Simple Fuzzer for REST APIs

In this report, we explain what fuzzing is, how it works and how to build your own simple fuzzer to perform quick, automated, comprehensive penetration tests of web APIs.

Content Aggregator icon
Content Aggregator

29% of Organizations Have or Are Implementing Zero Trust

Nearly 29% of organizations have a zero-trust model already in place or projects underway, while 43% are in some sort of planning stage. Nearly a third have no plans or are not familiar with zero trust.

Tools & Templates icon
Tools & Templates

Vulnerability Management Process Workflow (Updated)

In most organizations, vulnerability management is as difficult as it is critical. This tool is designed to clarify the process by providing a basic vulnerability management workflow, including all steps and participants. (Updated May 2020)

Webinar Replays icon
Webinar Replays

Fed, State and City Data Privacy Laws: Common Requirements

Security teams struggle to keep up with a patchwork of federal, state and city privacy laws. What are the commonalities between them all and where should teams focus most of their energy? In this webinar, George Gerchow explores the trajectory of state and federal legislation, the best sources for keeping track, and how to recognize the different industry implications from one law to the next.

Content Aggregator icon
Content Aggregator

40% of Companies Expect IAM Budgets to Increase

Forty percent of organizations expect an increase in their identity/access management-related budgets over the 18-month period between Jan. 2020 and June 2021. Only 15% believe these budgets will see a decline.

Interested in learning more about the Portal?

Provide us with your information and an IANS team member will reach out.

* Required Fields