We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Management & Leadership


October 19, 2018 | Team Structure and Management
By Bruce Bonsall, IANS Faculty

 Grow Your Infosec Program Over Time

When the business is expected to double in five years, information security needs a growth plan as well. In this Ask-an-Expert written response, IANS Faculty Bruce Bonsall uses specific results from IANS' Organizational Engagement and Technical Diagnostics to help a team focus on immediate and long-term steps.

Read More »

October 15, 2018 | Privacy
By George Gerchow, IANS Faculty

 Pros and Cons of a Combined CISO/DPO Role

With new regulations like the EU's GDPR and California's privacy law, many organizations are realizing the need for a data privacy officer (DPO). In this Ask-an-Expert written response, IANS Faculty George Gerchow explains the pros and cons of combining the CISO and DPO roles, including a full SWOT analysis.

Read More »

October 5, 2018 | Security Policies and Strategy

 Zero-Trust Zone Acceptable Use Policy Template

This template provides an acceptable use policy for a system within a zero-trust network zone, including detailed expectations, consequences for violations, and obligations during and after access.

Read More »

September 20, 2018 | Budgeting
By Rich Guida, IANS Faculty

 Better Align Security with the Business

Some CISOs seem to constantly struggle to get the information, support and funding they need from executive management – and even IT. In this Ask-an-Expert written response, IANS Faculty Rich Guida offers tips for improving security's reporting structure, business interactions and budget.

Read More »

September 17, 2018 | Team Structure and Management
By Mike Saurbaugh, IANS Faculty

 IT vs. Security: Which Team Owns Which Tools?

Most organizations use a variety of tools to streamline and secure the business, but determining proper governance and tool "ownership" between security and IT can be challenging. In this Ask-an-Expert written response, IANS Faculty Mike Saurbaugh explains what tool ownership entails and provides examples of common ways to divvy up responsibilities.

Read More »