We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Content Aggregator

\ Content Aggregator\ Key InfoSec Reports

 

Vetted, curated, third party sourced information security content in downloadable PowerPoint format to support internal communications to the C-suite, Board, and lines of business.

IANS Content Aggregator

[ 386 ]

Slides

Single Content Aggregator slides, organized by six topical categories.

View All Slides
[ 5 ]

Compilations

Collections of single Content Aggregator slides on specific InfoSec topics.

View Compilations
[ 2 ]

Narratives

Compilations of slides that include a viewpoint or “IANS Perspective”.

View Narratives


April 16, 2018 | Key Infosec Reports

 Overview of Biggest Obstacles to Managing Security

Security professionals blame budget constraints, compatibility issues with legacy systems and lack of trained personnel as their most common obstacles to managing security, according to a Cisco survey of 3,600 security professionals worldwide.

Read More »


December 26, 2017 | Key Infosec Reports

 39% of Firms Do Not Require Security Awareness Training for All Employees

Employee awareness is not a simple check-the-box exercise. Companies must invest in comprehensive, ongoing programs to minimize the weakest link syndrome. In this regard, workforce-wide cybersecurity training is only the first step. Reinforcing and testing the awareness training over time will also allow for optimization and point to where knowledge gaps exist. Post-test evaluations and ongoing improvements are also required to fully realize the benefits of cybersecurity awareness training.

Read More »


December 18, 2017 | Key Infosec Reports

 Top Methods for Finding Shadow IT

IT departments appear to be moving towards more active methods of monitoring and employing technology in an effort to gain better visibility into shadow IT. Next-generation firewalls have replaced database activity monitoring as the most common method being used.

Read More »


December 14, 2017 | Key Infosec Reports

 39% of Enterprises Forced to Slow Cloud Adoption Due to Cyber Skills Gap

The ongoing shortage of security skills is continuing to affect cloud deployments. Thirty-nine percent of organizations report that the lack of cybersecurity skills has slowed adoption or usage of cloud services, possibly contributing to the increase in Shadow IT activities. Another 36% report that they are experiencing a scarcity of skills but are continuing with their cloud activities regardless. Only 15% stated that they do not have a skills shortage.

Read More »


December 13, 2017 | Key Infosec Reports

 Operational Impact, Downtime the Most Common Breach Consequence

According to the 2017 AT&T global state of cybersecurity survey, a cybersecurity attack has negatively affected nearly 80% of surveyed organizations in the past 12 months. The impact touches virtually every aspect of the business, with operational impact/downtime the most prevalent consequence.

Read More »


December 8, 2017 | Key Infosec Reports

 62% of Companies Store Personal Customer Data on Public Cloud

A full 62 percent of surveyed IT professionals said that they store personal customer information on the public cloud. Beyond this, 51 percent said they store personal staff information on the public cloud, while 30 percent admitted to storing network passwords, a major concern if attackers were to gain access.

Read More »


December 4, 2017 | Key Infosec Reports

 Enterprise Cloud-Connected Apps Have Increased Six-Fold Since 2014

The number of unique cloud-connected apps per organization has rapidly increased since 2014, from 180 to more than 1,000 in 2017. Third-party cloud-connected applications introduce risk because they touch corporate infrastructure and can communicate with corporate cloud and SaaS systems.

Read More »