Content Type
Date Range
Event | Dec/9/2025
The buzz around Agentic AI – the latest form of AI systems designed to autonomously make decisions and act – is rampant. As security leaders grapple to understand the nuances of this next wave of AI excitement, there are many considerations to take into account to determine if, where and how to experiment and accelerate its use within your environment. In this symposium, IANS Faculty cuts through the noise and shares practical insights and recommendations to aid your understanding of the technology, its risks and guardrails for adoption within your enterprise.
Event | Sep/25/2025
A good implementation plan can mean the difference between a successful tool/service purchase and shelfware. In this webinar, IANS Faculty offer key guidance, including:
Involving the right people and earmarking the right resources
Setting achievable project milestones, and knowing when implementation is over and usage/optimization begins
Configuring the right metrics to ensure you gain value immediately and over time
Event | Nov/18/2025
This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage with IANS Faculty members and network with peers who are tackling similar challenges.
Event | Jul/10/2025
AI is putting legacy data governance processes under a microscope. In response, a number of key frameworks are emerging to provide a foundation for orgs to use as a starting point. This session dives into the strategic and tactical steps to take to improve AI governance, regardless of which framework you choose, and provides a rundown of some of the most prominent AI governance frameworks.
Event | Mar/25/2025
IANS Executive Communications Incident Briefing: Hacker Claims Theft of 6M Records from Oracle Cloud
IANS Faculty Jake Williams will discuss the alleged breach of Oracle’s Cloud involving a threat actor claiming to have stolen 6m records across 140,000 Oracle tenants. The alleged stolen data includes JKS files, encrypted SSO passwords, key files and enterprise manager JPS keys. Jake will discuss what we know and don’t know about this incident, the third-party-risk management (TPRM) concerns, what steps organizations should be taking and how CISOs should be communicating to their executive teams.
Event | May/7/2025
Many organizations began their zero trust journey focusing on identity, devices and networks. Increasingly, there is broad industry recognition that zero trust initiatives, due to their holistic nature, need to more explicitly include an emphasis on workloads and data.
Blog | Mar/20/2025
Improve CISO, security leadership and staff hiring to attract and keep top security talent. Find guidance to evolve your recruiting methods to uncover true cyber talent during the hiring process.
Tools & Guides | Mar/18/2025
With the risk of CISO attrition on the rise, it's essential to stay ahead of the curve. This guide, based on data from over 800 CISOs and insights from industry leaders, provides you with the tools and knowledge to ensure your organization remains secure and resilient.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.