All Blogs
Showing 307-315 of 362
Managing Vendors and Third Parties
Best Practices for the Third-Party Onboarding Process
May 27, 2021
Understand potential issues that can arise throughout the third-party onboarding process and find tips to ensure the process is both flexible and secure.
IANS Faculty
Managing Vendors and Third Parties
Top Strategies for Identifying Software Supply Chain Risks
May 25, 2021
Discover mid and high-return strategies for discovering and managing software supply chain risks to prevent harmful cyber attacks for your organization.
IANS Faculty
Governance, Risk Management & Compliance
How to Use the NIST Privacy Framework
May 20, 2021
Our Faculty provides guidance for InfoSec teams on how to use the NIST Privacy Framework within their organization.
IANS Faculty
Governance, Risk Management & Compliance
What is the NIST Privacy Framework?
May 18, 2021
Our Faculty explains what the NIST Privacy Framework is in a way InfoSec teams can understand and prepare to act.
IANS Faculty
Threats & Vulnerabilities
How to Prevent Ransomware Attacks
May 13, 2021
When it comes to ransomware, prevention is half the battle. Learn how to prevent ransomware attacks by building the right controls and processes.
IANS Faculty
Threats & Vulnerabilities
Ransomware Trends in 2021
May 11, 2021
Learn how the ransomware threat is evolving as we look at 2021 trends along with IANS Faculty insights into how ransomware spreads.
IANS Faculty
Governance, Risk Management & Compliance
How to Transition to an IT Shared Services Model
May 6, 2021
Learn how to design an IT shared services model to serve customers efficiently, effectively, and securely.
IANS Faculty
Governance, Risk Management & Compliance
Creating NIST-Compliant CUI Data Flows
May 4, 2021
A step-by-step process for creating CUI data flows according to NIST requirements – By IANS Research.
IANS Faculty
Governance, Risk Management & Compliance
How to Create an Enterprise Risk Appetite Statement
April 29, 2021
Learn how to develop a risk appetite statement by creating an enterprise risk register that can serve as guidance when allocating resources to security threats.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.