home_banner

Insights Portal

The IANS Insights Portal contains thousands of research articles, Ask-An-Expert responses, Tools & Templates, Executive Communications materials, Content Aggregator updates and IANS event takeaways. Here you will find a collection of anonymized case studies and real-world examples containing tangible, actionable advice to help you address your organization's challenges.

Interested in our content?

Provide us with your information and an IANS team member will reach out with more information on gaining access.

* Required Fields

Are you an existing client?

If you already have credentials, sign in below.


Still want to know more about IANS?

Learn more about what we have to offer by exploring our website and enjoying some of our complimentary sample content.

Selected Filters:

66

Results

Filter Options: 
  • Product: The type of product the content is served in. (i.e. Ask-An-Expert, Faculty Report, Content Aggregator, etc.)
    • Content Aggregator Compilations: Collections of singular Content Aggregator slides on specific InfoSec topics
    • Content Aggregator Narratives: Collections of singular Content Aggregator slides on specific InfoSec topics that include a viewpoint or “IANS Perspective"
  • Topic: The general topic that the content falls under. (i.e. Cloud Computing, Infrastructure, Vendor Management, etc.)
  • Author: The creator of a piece of content.
Tools & Templates icon
Tools & Templates

AWS Security Checklist

While there are many security best practices for organizations making the move to Amazon Web Services (AWS) accounts and environments, this checklist provides the most practical, applicable security steps organizations should take to ensure their workloads remain secure.

Tools & Templates icon
Tools & Templates

CASB Feature Checklist

This checklist details the primary features every organization should assess to ensure the cloud access security broker (CASB) they choose aligns with their cloud security goals.

Tools & Templates icon
Tools & Templates

Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Tools & Templates icon
Tools & Templates

Post-Incident Q&A Checklist

While no two cybersecurity incidents are the same, questions from the media, customers and other external stakeholder groups tend to cover the same topics following the disclosure of a breach. This checklist contains 10 of the most commonly asked questions companies should be prepared to answer following a cybersecurity incident, along with high-level guidance for responding to inquiries.

Tools & Templates icon
Tools & Templates

Cyber Incident Communications Checklist

This high-level communications checklist is designed to be followed during the first 72 hours of an incident. It is meant to guide the response process as the incident develops and should be adjusted to suit a company’s bandwidth and operations, as well as the circumstances of the incident. 

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.