home_banner

Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Interested in our content?

Provide us with your information and an IANS team member will reach out with more information on gaining access.

* Required Fields

Are you an existing client?

If you already have credentials, sign in below.


Still want to know more about IANS?

Learn more about what we have to offer by exploring our website and enjoying some of our complimentary sample content.

Selected Filters:

66

Results

Filter Options: 
  • Product: The type of product the content is served in. (i.e. Ask-An-Expert, Faculty Report, Content Aggregator, etc.)
    • Content Aggregator Compilations: Collections of singular Content Aggregator slides on specific InfoSec topics
    • Content Aggregator Narratives: Collections of singular Content Aggregator slides on specific InfoSec topics that include a viewpoint or “IANS Perspective"
  • Topic: The general topic that the content falls under. (i.e. Cloud Computing, Infrastructure, Vendor Management, etc.)
  • Author: The creator of a piece of content.
Tools & Templates icon
Tools & Templates

Log Monitoring Checklist

This checklist presents the most common/important logs to review and what to focus on within the log data. 

Tools & Templates icon
Tools & Templates

Vendor Management Tasks/Roles Cheat Sheet

There are many ways to structure a vendor management program. Here we examine two approaches (traditional and distributed) and detail the vendor management tasks required as well as who within the organization should handle each one. 

Tools & Templates icon
Tools & Templates

CISO Marketing Checklist

Information security professionals interested in moving up the team ladder need to ensure they are positioning themselves to become executive-level leaders, a task that requires marketing both within and outside the information security arena. This checklist is designed to help you market yourself as you progress toward the chief information security officer (CISO) role.

 

Tools & Templates icon
Tools & Templates

Mobile Policy Template

When creating a mobile policy, it's important to consider the scope of mobile usage in the enterprise, as well as any enforcement controls. This template provides some guidelines and sample verbiage.

Tools & Templates icon
Tools & Templates

CISO Priorities Checklist

This checklist is designed to help CISOs prioritize their focus in the first 30 days, six months and year of their tenure to ensure they get off to a fast, successful start.

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.