We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Incident Response & Recovery


December 13, 2018 | Malware and Advanced Threats
By Bill Brenner, IANS Faculty,
     Dave Shackleford, IANS Faculty

 2018 in Review

In this webinar, IANS Research Director Bill Brenner and IANS Faculty Dave Shackleford look back at the biggest security news trends of 2018, what made them significant and what it all could mean for the year ahead.

Read More »

November 30, 2018 | Data Breaches

 Marriott Discloses Data Breach Impacting 500 Million Customers

Marriott disclosed that the personal details of up to 500 million guests were compromised in a Starwood reservation system data breach that had been ongoing since 2014. The database contained personal details such as names, addresses, phone numbers, email addresses, passport numbers and travel details. In some cases, the compromised information also included payment card numbers and expiration dates.

Read More »

October 31, 2018 | Malware and Advanced Threats
By Josh More, IANS Faculty

 The Chinese Chip Hack: What You Need to Know

A recent Bloomberg report that China planted spy chips on popular server motherboards used by the likes of Apple and Amazon is triggering an avalanche of denials and call for retraction. What's the real story? In this Ask-an-Expert live interaction, IANS Faculty Josh More explains both sides of the issue and recommends ways enterprises can protect themselves.

Read More »

October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »

October 12, 2018 | Data Breaches

 Post-Incident Q&A Checklist

While no two cybersecurity incidents are the same, questions from the media, customers and other external stakeholder groups tend to cover the same topics following the disclosure of a breach. This checklist contains 10 of the most commonly asked questions companies should be prepared to answer following a cybersecurity incident, along with high-level guidance for responding to inquiries.

Read More »

October 12, 2018 | Incident Response Planning

 Cyber Incident Communications Checklist

This high-level communications checklist is designed to be followed during the first 72 hours of an incident. It is meant to guide the response process as the incident develops and should be adjusted to suit a company’s bandwidth and operations, as well as the circumstances of the incident. 

Read More »

October 5, 2018 | Malware and Advanced Threats
By Mike Saurbaugh, IANS Faculty

 IANS Vulnerability and Breach Update: Q3 2018

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Read More »

September 28, 2018 | Business Continuity and Disaster Recovery (BCDR)

 Business Impact Analysis Template

This template can be used to help the business identify and prioritize critical assets that must be protected and recovered during a business continuity/disaster recovery (BC/DR) event.  

Read More »