We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates\ Management & Leadership

 

Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates



November 2, 2018 | Security Policies and Strategy

 Mobile Policy Template

When creating a mobile policy, it's important to consider the scope of mobile usage in the enterprise, as well as any enforcement controls. This template provides some guidelines and sample verbiage.

Read More »


October 29, 2018 | Team Structure and Management

 CISO Priorities Checklist

This checklist is designed to help CISOs prioritize their focus in the first 30 days, six months and year of their tenure to ensure they get off to a fast, successful start.

Read More »


October 5, 2018 | Security Policies and Strategy

 Zero-Trust Zone Acceptable Use Policy Template

This template provides an acceptable use policy for a system within a zero-trust network zone, including detailed expectations, consequences for violations, and obligations during and after access.

Read More »


June 6, 2018 | Budgeting

 Security Spend Guideline

This table shows what most organizations consider a security spend vs. spending for other departments (IT, operations, network, etc.). While there are no hard-and-fast rules, this table provides a general, time-tested guideline.

Read More »


May 9, 2018 | Recruiting, Hiring and Retention

 Hiring and Retention Resource Kit

This kit offers several tips and resources to assist in hiring and retaining cybersecurity professionals, as well as links to helpful third-party supplemental materials.

Read More »


December 18, 2017 | Security Policies and Strategy

 CISO Impact Firmographic

Security teams of all industries and organization sizes have a pressing need for funding to keep their programs effective. The CISO Impact Firmographic is a benchmarking tool that allows you to compare your security budget and team size to organizations of similar sizes in your industry, and it is based on our research with more than 1,000 information security teams.

Read More »


December 6, 2017 | Security Policies and Strategy

 M&A and Divestiture Security Checklists

These checklists are designed to be a guide to help information security professionals understand the M&A and divestiture processes end-to-end, identify the best places to inject security and determine to-do list items that must be addressed within the deal lifecycle. 

Read More »


October 31, 2017 | Security Policies and Strategy

 Comprehensive Security Policy Generator

One of the best ways to construct a set of comprehensive information security policies is to start with the control categories laid out in ISO 27001 Annex A (also known as ISO 27002), and then describe what infosec policies apply to each of the controls. This document does just that, giving organizations the power to measure their current policies against this framework or develop new ones that align with the full scope of the ISO 27002 controls. 

Read More »


October 17, 2017 | Recruiting, Hiring and Retention

 Information Security Job Description Templates

With the information security workforce shortage projected to reach 2-3 million over the next few years, organizations are putting a greater emphasis on their recruiting process to better fill out their security teams. Use these sample infosec job descriptions to set the foundation for role expectations and attract the most highly qualified professionals to your organization. 

Read More »