Cybersecurity Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of cybersecurity content available to our clients in the IANS Insights Portal.

Showing 37-45 of 49
Guide Risk Management

5 Real-World Use Cases for AI and How Best to Secure Them

Understand the main issues with AI, along with common business use cases and recommendations for protecting the organization when using each.

Josh More, IANS Faculty
Guide Security Policies and Strategy

AI Acceptable Use Policy Template

Find best practices to help create and govern your organization’s policy on acceptable generative AI use cases.

Joshua Maret, IANS Faculty & Jason Garbis, IANS Faculty
Checklist Application Security

DevSecOps Best Practices Checklist

Use this timesaving checklist that details best practices to follow, and pitfalls to avoid ensuring DevSecOps success.
Tanya Janca, IANS Faculty
Guide DATA PROTECTION

Data Protection and Classification Policy Template

Use our Data Protection and Classification Policy developed by IANS Faculty member, Kelli Tarala as a workable template to establish data protection and compliance standards for your organization.  
Kelli Tarala, IANS Faculty
Guide INCIDENT RESPONSE AND RECOVERY

Tabletop Scenario Templates

Help better prepare your organization for potential cyberattacks using these 8 tabletop scenario templates.

Bill Dean, IANS Faculty
Checklist Enterprise Software

GRC Roles and Responsibilities Checklist

Find a timesaving checklist that details the GRC tasks commonly implemented at most organizations.
Justin Leapline, IANS Faculty
Checklist Incident Response and Recovery

Ransomware Prep Toolkit

Use our Ransomware Prep Toolkit from IANS Faculty, Dave Shackleford to prepare and respond to ransomware incidents quickly and effectively.
Dave Shackleford
Guide Security Operations

Top 8 SOAR Use Cases and Playbooks

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

Gal Shpantzer, IANS Faculty
Guide Networking

Zero Trust: A Step-by-Step Guide

Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.
Dave Shackleford, IANS Faculty