home_banner

Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Interested in our content?

Provide us with your information and an IANS team member will reach out with more information on gaining access.

* Required Fields

Are you an existing client?

If you already have credentials, sign in below.


Still want to know more about IANS?

Learn more about what we have to offer by exploring our website and enjoying some of our complimentary sample content.

Selected Filters:

1385

Results

Filter Options: 
  • Product: The type of product the content is served in. (i.e. Ask-An-Expert, Faculty Report, Content Aggregator, etc.)
    • Content Aggregator Compilations: Collections of singular Content Aggregator slides on specific InfoSec topics
    • Content Aggregator Narratives: Collections of singular Content Aggregator slides on specific InfoSec topics that include a viewpoint or “IANS Perspective"
  • Topic: The general topic that the content falls under. (i.e. Cloud Computing, Infrastructure, Vendor Management, etc.)
  • Author: The creator of a piece of content.
Faculty Reports icon
Pinned Faculty Reports

2019 Forum Curriculum Detail

The 2019 IANS Forum series consists of two-day events that bring together IT and information security practitioners for keynotes, breakout sessions, technology spotlight sessions and networking breaks. This brochure provides a detailed look at the topics we'll explore this year.

Faculty Reports icon
Faculty Reports

10 Steps to Harden Critical Infrastructure

Industrial control systems (ICS) and other critical infrastructure continue to be top targets of nation-state attackers and others with deep pockets/expertise. In this report, IANS Faculty Bryson Bort explains the main ICS vulnerabilities and offers 10 concrete steps for hardening these systems against current (and future) attacks.

Ask-An-Expert icon
Ask-An-Expert

Best Practices for Migrating to Office 365

Given the sheer number of options and apps available in Office 365, establishing security governance across it all can be daunting. In this Ask-an-Expert written response, IANS Faculty Matthew Chiodi emphasizes the importance of strategy and programmatic policy enforcement in the process. 

Content Aggregator icon
Content Aggregator

Overview of Targeted Attacks in 2018

The most likely reason for an organization to experience a targeted attack was intelligence gathering, which is the motive for 96 percent of targeted attack groups. Spear-phishing emails remained the most popular avenue for attacks and were used by 65 percent of all known groups. The use of zero-day vulnerabilities declined in 2018, with only 23 percent of attack groups known to have exploited zero days, down from 27 percent in 2017.

Webinars icon
Webinars

IoT in the Enterprise: Minimizing the Risks

There’s no clear consensus on who is responsible for managing risks associated with IoT devices in an organization. This session is designed to clear up that confusion. IANS Faculty Bryson Bort reviews where all the IoT devices are, the breakdown of who should be in charge of security risks related to IoT, and how to assemble a responsibility tree for who does what if an IoT-related compromise happens.