We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

 


October 17, 2018 | Privacy
By George Gerchow, IANS Faculty

 GDPR 5 Months Later: Where You Should Be By Now

The deadline to comply with the European Union’s data protection regulation was May 25, but for many organizations the work is just beginning. Myriad questions remain for individual companies as to the size and scope of what they must do to be in compliance. In this webinar, IANS Faculty George Gerchow walks through where you should be and how to get there.

Read More »


October 17, 2018 | Key Technologies

 Overview of the Use of Multi-Factor Authentication

Organizations use passwords only instead of multi-factor authentication on homegrown or on-premises apps (75%), Mac machines (72%) and privileged account management products (57%). Multifactor authentication is used over passwords only by more organizations on Windows machines (55%), SaaS apps (51%) and for access to virtual private networks (50%).

Read More »


October 17, 2018 | Authentication
By Aaron Turner, IANS Faculty

 Best Practices in Mobile App Authentication

Is there a way to ensure mobile app users authenticate securely without ruining the native app experience? In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner offers several tips, from reducing initial friction but elevating authentication at purchase, to protecting against brute-force attacks and credential-stealing malware.

Read More »


October 15, 2018 | Privacy
By George Gerchow, IANS Faculty

 Pros and Cons of a Combined CISO/DPO Role

With new regulations like the EU's GDPR and California's privacy law, many organizations are realizing the need for a data privacy officer (DPO). In this Ask-an-Expert written response, IANS Faculty George Gerchow explains the pros and cons of combining the CISO and DPO roles, including a full SWOT analysis.

Read More »


October 12, 2018 | Incident Response Planning

 Cyber Incident Communications Checklist

This high-level communications checklist is designed to be followed during the first 72 hours of an incident. It is meant to guide the response process as the incident develops and should be adjusted to suit a company’s bandwidth and operations, as well as the circumstances of the incident. 

Read More »


October 12, 2018 | Data Breaches

 Post-Incident Q&A Checklist

While no two cybersecurity incidents are the same, questions from the media, customers and other external stakeholder groups tend to cover the same topics following the disclosure of a breach. This checklist contains 10 of the most commonly asked questions companies should be prepared to answer following a cybersecurity incident, along with high-level guidance for responding to inquiries.

Read More »