All Blogs

Showing 307-315 of 362
Managing Vendors and Third Parties

Best Practices for the Third-Party Onboarding Process

May 27, 2021
Understand potential issues that can arise throughout the third-party onboarding process and find tips to ensure the process is both flexible and secure.
IANS Faculty
Managing Vendors and Third Parties

Top Strategies for Identifying Software Supply Chain Risks

May 25, 2021
Discover mid and high-return strategies for discovering and managing software supply chain risks to prevent harmful cyber attacks for your organization.
IANS Faculty
Governance, Risk Management & Compliance

How to Use the NIST Privacy Framework

May 20, 2021
Our Faculty provides guidance for InfoSec teams on how to use the NIST Privacy Framework within their organization.
IANS Faculty
Governance, Risk Management & Compliance

What is the NIST Privacy Framework?

May 18, 2021
Our Faculty explains what the NIST Privacy Framework is in a way InfoSec teams can understand and prepare to act.
IANS Faculty
Threats & Vulnerabilities

How to Prevent Ransomware Attacks

May 13, 2021
When it comes to ransomware, prevention is half the battle. Learn how to prevent ransomware attacks by building the right controls and processes.
IANS Faculty
Threats & Vulnerabilities

Ransomware Trends in 2021

May 11, 2021
Learn how the ransomware threat is evolving as we look at 2021 trends along with IANS Faculty insights into how ransomware spreads.
IANS Faculty
Governance, Risk Management & Compliance

How to Transition to an IT Shared Services Model

May 6, 2021
Learn how to design an IT shared services model to serve customers efficiently, effectively, and securely.
IANS Faculty
Governance, Risk Management & Compliance

Creating NIST-Compliant CUI Data Flows

May 4, 2021
A step-by-step process for creating CUI data flows according to NIST requirements – By IANS Research.
IANS Faculty
Governance, Risk Management & Compliance

How to Create an Enterprise Risk Appetite Statement

April 29, 2021
Learn how to develop a risk appetite statement by creating an enterprise risk register that can serve as guidance when allocating resources to security threats.
IANS Faculty