home_banner

Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Not an IANS client?

Download samples of our content from the Decision Support page to get a better understanding of our subscription deliverables.

Download Samples

Are you an existing client?

If you already have credentials, sign in below.


Interested in speaking with someone?

Provide us with your information and an IANS team member will reach out.

* Required Fields
Selected Filters:

77

Results

Filter Options: 
  • Product: The type of product the content is served in. (i.e. Ask-An-Expert, Faculty Report, Content Aggregator, etc.)
    • Content Aggregator Compilations: Collections of singular Content Aggregator slides on specific InfoSec topics
    • Content Aggregator Narratives: Collections of singular Content Aggregator slides on specific InfoSec topics that include a viewpoint or “IANS Perspective"
  • Topic: The general topic that the content falls under. (i.e. Cloud Computing, Infrastructure, Vendor Management, etc.)
  • Author: The creator of a piece of content.
Tools & Templates icon
Tools & Templates

Policy Ownership Guide

Who should own which infosec policies and why? This guide details the appropriate owners of individual infosec policies and standard operating procedures (SOPs).

Tools & Templates icon
Tools & Templates

Open Source Tool Guide

This guide lists a range of open source security tools used by IANS Faculty across several information security areas, including cloud, data protection, infrastructure, leadership, networking, operations, incident response and malware/threat defense. 

Tools & Templates icon
Tools & Templates

Perimeter Security Checklist

Perimeter security is critically important. This high-level checklist provides best practice steps to keep your perimeter and organization secure.

Tools & Templates icon
Tools & Templates

Due Diligence Questionnaire

This questionnaire is used during the due diligence phase of the third-party risk management process. It is developed based on the security and financial risks identified and quantified in the initial risk assessment, completed by vendors and then numerically scored by the third-party risk assessment team. 

Tools & Templates icon
Tools & Templates

CISO Communications Checklist

Today, CISOs are called on to brief company leadership, present at industry-leading conferences and speak with the media. This checklist is designed to help CISOs prepare to present confidently, set themselves apart from their peers and preserve the trust and confidence of company leadership.