InfoSec Tools & Guides

Each downloadable piece featured below is a fully-detailed, actionable resource that's part of a larger collection of infosec content available to our clients in the IANS Insights Portal.

Checklist icon
Checklist

Incident Response and Recovery

Ransomware Prep Toolkit

by Dave Shackleford

Use our Ransomware Prep Toolkit from IANS Faculty, Dave Shackleford to prepare and respond to ransomware incidents quickly and effectively.

See Details
Guide icon
Guide

Malware and Advanced Threats

Third-Party Ransomware Incident Handling Playbook

by Jake Williams, IANS Faculty

Use this playbook to help your organization assess and mitigate impact in the event of a third-party vendor ransomware incident.

See Details
Report icon
Report

Vulnerability Assessment and Management

IANS Vulnerability and Breach Update: Q4 2023

by Mike Saurbaugh, IANS Faculty

In this quarterly research report, IANS updates you on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

See Details
Guide icon
Guide

Security Awareness, Phishing, Social Engineering

Security Awareness Blog Templates

by IANS Faculty

This template serves as a baseline breakdown of security, it’s role within your organization, and steps employees should take to ensure they aren’t exposing your organization to unnecessary risk.

See Details
Guide icon
Guide

Security Policies and Strategy

AI Acceptable Use Policy Template

by Joshua Maret, IANS Faculty & Jason Garbis, IANS Faculty

Find best practices to help create and govern your organization’s policy on acceptable generative AI use cases.

See Details
Guide icon
Guide

Risk Management

5 Real-World Use Cases for AI and How Best to Secure Them

by Josh More, IANS Faculty

Understand the main issues with AI, along with common business use cases and recommendations for protecting the organization when using each.

See Details
Guide icon
Guide

Management and Leadership

8 Ways to Mitigate the Risks of ChatGPT and Generative AI

by Jake Williams, IANS Faculty

Identify and learn about the top risks of AI tools and find recommendations on how to mitigate those risks.

See Details
Checklist icon
Checklist

Vendor and Partner Management

Third-Party Software Security Checklist

by Richard Seiersen, IANS Faculty

Find four high-level best practices for securing third-party software in this Third-Party Software Security Checklist by IANS Faculty member, Richard Seiersen.

See Details
Guide icon
Guide

Metrics and Reporting

Create Incident Response Metrics Worth Reporting

by Adrian Sanabria, IANS Faculty

Learn how to create IR metrics that focus on improvement and resonate with management using our 'Create Incident Response Metrics Worth Reporting' guide.

See Details
Guide icon
Guide

INCIDENT RESPONSE AND RECOVERY

Tabletop Scenario Templates

by Bill Dean, IANS Faculty

Help better prepare your organization for potential cyberattacks using these 8 tabletop scenario templates.

See Details
Guide icon
Guide

Executive Development

5 Attributes of Top-Performing CISOs

by IANS Research

Further your professional development as a security leader by downloading our ‘5 Attributes of Top-Performing CISOs’ research report.

See Details
Checklist icon
Checklist

Enterprise Software

GRC Roles and Responsibilities Checklist

by Justin Leapline, IANS Faculty

Find a timesaving checklist that details the GRC tasks commonly implemented at most organizations.

See Details
Guide icon
Guide

Networking

Zero Trust: A Step-by-Step Guide

by Dave Shackleford, IANS Faculty

Gain insights on the implementation of zero trust tools and technologies in this step-by-step guide from IANS Faculty member, Dave Shackleford.

See Details
Guide icon
Guide

Security Operations

Harden M365 Identities and Exchange Online

by Aaron Turner, IANS Faculty

Learn how to harden M365 Identities and Exchange Online from IANS Faculty, Aaron Turner. Prioritize activities that protect against Azure AD and Exchange Online attacks.

See Details
Guide icon
Guide

DATA PROTECTION

Data Protection and Classification Policy Template

by Kelli Tarala, IANS Faculty

Use our Data Protection and Classification Policy developed by IANS Faculty member, Kelli Tarala as a workable template to establish data protection and compliance standards for your organization.  

See Details
Guide icon
Guide

Security Operations

Top 8 SOAR Use Cases and Playbooks

by Gal Shpantzer, IANS Faculty

Use our ‘Top 8 Soar Uses and Playbooks’ developed by IANS Faculty, Gal Shpantzer, to successfully augment your security strategy with SOAR.

See Details
Checklist icon
Checklist

Application Security

DevSecOps Best Practices Checklist

by Tanya Janca, IANS Faculty

Use this timesaving checklist that details best practices to follow, and pitfalls to avoid ensuring DevSecOps success.

See Details