Filter By:

Type

Topic

Recent Blogs & Podcasts

20 Results for: "Mark Clancy"

 



March 29, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Create an Effective Insider Threat Monitoring Program

Monitoring for insider threats is both important and complex, especially when privacy is also a concern. In this Ask-an-Expert live interaction, IANS Faculty Mark Clancy details the key steps to building an effective monitoring program, from deciding what and who to monitor, to ensuring employee privacy is protected. 

Read More »


January 3, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Insider Threats: Know What to Watch For

Detecting and stopping insider threats requires a strong balance between people-oriented processes and technology-oriented solutions. In this Ask-an-Expert written response, IANS Faculty Mark Clancy details some common insider threat scenarios and offers tips for detecting them before they cause harm.

Read More »


December 27, 2017 | Security Analytics and Visualization
By Mark Clancy, IANS Faculty

 Anomaly Detection: A Market Landscape

Detecting anomalies across both users and networks requires a strong combination of network, endpoint detection and response (EDR), security and information event management (SIEM) capabilities and more. In this Ask-an-Expert written response, IANS Faculty Mark Clancy provides a rundown of market options, including their pros and cons.

Read More »


November 30, 2017 | Risk Management
By Mark Clancy, IANS Faculty

 GRC Alternatives: Evaluating the Vendor Landscape

Whether they focus on integrated risk management or security analytics and reporting, alternatives to more comprehensive GRC tools abound - but how well do they stack up? In this Ask-an-Expert written response, IANS Faculty Mark Clancy examines the broad vendor landscape and offers some tips for choosing the solution that best fits your needs.

Read More »


July 28, 2017 | Regulations & Legislation
By Mark Clancy, IANS Faculty

 Tackle the NYSDFS Cybersecurity Regulations

Many organizations in the banking, insurance and financial services sectors are in the process of complying with the New York State Department of Financial Services' new cybersecurity regulations. In this report, IANS Faculty Mark Clancy offers tips and key strategies for complying with the new requirements, particularly around authentication, audit logging, encryption and training/awareness. 

Read More »


July 31, 2017 | Incident Investigations, Handling and Tracking
By IANS Faculty, IANS Faculty

 Poll: Is It Better to Shut Down/Disconnect a Suspected Malware-Infected Device or Leave It Running?

When malware strikes, ensuring employees know and take the right steps immediately can make all the difference. In this report, IANS Faculty Mark Clancy, Dave Kennedy, Aaron Turner and Marcus Ranum weigh in on whether employees' first step should be to shut down the infected machine or contact security. 

Read More »


March 13, 2017 | Single Sign-on
By Aaron Turner, IANS Faculty

 Assessing the Pros and Cons of IdentityServer

When evaluating single sign-on (SSO) solutions, it's important to examine a number of factors, including scalability, features, ease-of-use and cost. In this Ask-an-Expert written response, IANS Faculty Aaron Turner examines some of the pros and cons of IdentityServer as an SSO platform and compares it against other popular solutions such as ForgeRock and Active Directory Federation Services. 

Read More »