We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates


Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates

May 9, 2018 | Recruiting, Hiring and Retention

 Hiring and Retention Resource Kit

This kit offers several tips and resources to assist in hiring and retaining cybersecurity professionals, as well as links to helpful third-party supplemental materials.

Read More »

May 2, 2018 | Vulnerability Assessment and Management

 Vulnerability Management Process Workflow

In most organizations, vulnerability management is as difficult as it is critical. This tool is designed to clarify the process by providing a basic vulnerability management workflow, including all steps and participants. 

Read More »

April 30, 2018 | Privacy

 GDPR-Compliant Privacy Policy Template

This is a template for a very mature privacy policy that covers General Data Protection Regulation (GDPR) Articles 4, 9, 14, 17 and 30. It is designed to clearly communicate how much the company cares about data privacy, what kind of data it potentially handles and how users/customers can delete it. 

Read More »

April 11, 2018 | Threat Intelligence and Modeling

 Threat Intelligence Checklist

The ability to obtain and effectively leverage quality threat intelligence is no longer optional for today’s information security teams. This checklist steps  through the process of choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.

Read More »

March 26, 2018 | Incident Response Planning

 IR in the Cloud Checklist

Incident response (IR) is never easy, but responding quickly and effectively to an incident when key evidence is housed and managed by a cloud vendor can be even more difficult. This checklist steps through the process of creating  effective, efficient IR in the cloud.

Read More »

March 22, 2018 | Cloud Network and Host Controls

 IANS Decision-Maker: IaaS Security Controls

For security teams, choosing security controls in the cloud can be daunting at best, and incredibly frustrating at worst. This tool is designed to help security teams make decisions on which solutions and controls make the most sense when moving workloads into IaaS environments.

Read More »

March 7, 2018 | Authentication

 Multi-Factor Authentication (MFA) Checklist

It's clear multi-factor authentication (MFA) offers a far more robust solution than passwords alone for protecting critical systems and data. In this checklist, IANS details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »

February 1, 2018 | Risk Management

 IANS Risk Register Tool (Updated)

Building a Risk Register is a critical undertaking for organizations of all sizes, and there are a number of factors that contribute to its accuracy and success. This tool (updated to include the latest PCI DSS 3.2 requirements) offers a step-by-step guide for identifying risk and harm, calculating exposure and adopting appropriate security controls. 

Read More »

January 30, 2018 | Enterprise and IT Compliance Management

 IANS General Data Protection Regulation (GDPR) Checklist

With all the noise, panic and questions about the EU’s new General Data Protection Regulation (GDPR), it’s difficult to discern the right mix of policies, procedures and technologies to ensure compliance. This checklist helps prioritize the practical steps you can take today to ensure your organization is fully prepared when the ruling comes into full force this May.

Read More »