We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates\ Threats & Vulnerabilities


Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates

October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »

May 2, 2018 | Vulnerability Assessment and Management

 Vulnerability Management Process Workflow

In most organizations, vulnerability management is as difficult as it is critical. This tool is designed to clarify the process by providing a basic vulnerability management workflow, including all steps and participants. 

Read More »

April 11, 2018 | Threat Intelligence and Modeling

 Threat Intelligence Checklist

The ability to obtain and effectively leverage quality threat intelligence is no longer optional for today’s information security teams. This checklist steps  through the process of choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.

Read More »

December 11, 2017 | Security Awareness, Phishing, Social Engineering

 Security Awareness Templates

There's no one-size fits all approach to security awareness, but having a robust, continually evolving program is critical to the success of the information security team. The Security Awareness Program Template and Security Awareness Scorecard give organizations a head start in not only building their security awareness program, but measuring its effectiveness over the long haul. 

Read More »

November 1, 2017 | Threat Intelligence and Modeling

 IANS Threat Modeling Tool

Threat modeling methodologies have existed for years in many forms, but there hasn't always been a simple and time-effective way to operationalize them. The IANS Threat Modeling Tool is designed to help jumpstart and evolve your organization's risk management efforts. 

Read More »

October 16, 2017 | Penetration Testing and Red Teaming

 Penetration Testing Request-for-Quote (RFQ) Template

Contracting with third-parties for penetration tests -- against both internal and externally facing resources -- is an important part of security. This RFQ is a template for identifying and selecting highly qualified vendors for the services of network and application penetration testing. 

Read More »

October 16, 2017 | Penetration Testing and Red Teaming

 Penetration Test Preparation Checklist

Penetration tests are risk-oriented and consist of activities ranging from vulnerability assessment to post-exploitation. Establishing specific test goals helps ensure the test meets expectations, and these questions should always be addressed during the scoping process. 

Read More »