We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates

 

Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates



November 27, 2018 | Privacy

 Personal Data Inventory Worksheet

When it comes to privacy, you can’t manage what you don’t know or hasn’t been defined. This worksheet helps determine the specific types of personal data collected, processed, stored or otherwise accessed within each business unit of an organization. 

Read More »


November 27, 2018 | Privacy

 Personal Data Flows Worksheet

When it comes to privacy, you can’t manage what you don’t know and has not been defined. This worksheet helps determine how an organization’s internal and external partners and other entities collect, process, store or otherwise access personal data. It also helps identify the security controls applied in each case to better clarify risks and uncover critical security gaps. 

Read More »


November 16, 2018 | Security Information and Event Management (SIEM) and Log Management

 Log Monitoring Checklist

This checklist presents the most common/important logs to review and what to focus on within the log data. 

Read More »


November 14, 2018 | Vendor and Partner Management

 Vendor Management Tasks/Roles Cheat Sheet

There are many ways to structure a vendor management program. Here we examine two approaches (traditional and distributed) and detail the vendor management tasks required as well as who within the organization should handle each one. 

Read More »


November 5, 2018 | Leadership Skills

 CISO Marketing Checklist

Information security professionals interested in moving up the team ladder need to ensure they are positioning themselves to become executive-level leaders, a task that requires marketing both within and outside the information security arena. This checklist is designed to help you market yourself as you progress toward the chief information security officer (CISO) role.

 

Read More »


November 2, 2018 | Security Policies and Strategy

 Mobile Policy Template

When creating a mobile policy, it's important to consider the scope of mobile usage in the enterprise, as well as any enforcement controls. This template provides some guidelines and sample verbiage.

Read More »


October 29, 2018 | Team Structure and Management

 CISO Priorities Checklist

This checklist is designed to help CISOs prioritize their focus in the first 30 days, six months and year of their tenure to ensure they get off to a fast, successful start.

Read More »


October 26, 2018 | Cloud Application and Data Controls

 AWS Security Checklist

While there are many security best practices for organizations making the move to Amazon Web Services (AWS) accounts and environments, this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.

Read More »


October 22, 2018 | Cloud Access Security Brokers

 CASB Feature Checklist

This checklist details the primary features every organization should assess to ensure the cloud access security broker (CASB) they choose aligns with their cloud security goals.

Read More »


October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »