Content Type
Date Range
Event | May/27/2025
Do you want to be a CISO? Do you want to be a better CISO? Join IANS Faculty Shamla Naidoo and Wolf Goerlich to explore the fundamental shifts and industry evolution of cybersecurity. We will discuss how complacency in recognizing these impending changes can present a risk for security leaders. Shamla and Wolf will share how to leverage leadership skills and behaviors to make a significant impact within your organization.
Blog | May/6/2025
Learn how IANS helped our client select the right PAM product that required fewer resources and minimal licensing ensuring a faster time-to-value deployment resulting in substantial cost savings.
Tools & Guides | May/6/2025
This guide provides high-level insights on the Privileged Access Management market, naming top vendors and challengers, and offers strategic guidance for 2025 budget investments.
Tools & Guides | May/6/2025
Join IANS Faculty Dave Shackleford and Shannon Lietz as they discuss prominent evens in cybersecurity for the week of April 30th, 2025
Tools & Guides | Apr/29/2025
This report tackles the projected cybersecurity talent gap by offering sample job descriptions for key roles, helping organizations refine hiring strategies and attract top security professionals.
Blog | Apr/28/2025
Without AI governance, the privacy and security of a business’ information can be vulnerable and lacks visibility into the data that is being shared with third-parties. It’s impossible to see whether data is being used by AI or if AI is being misused. To make order out of this chaos, it’s key to develop and implement a formal AI governance program.
Event | Jul/23/2025
CISO Roundtables are the most exclusive, intimate events offered by IANS. Our virtual roundtables are curated experiences with agendas designed specifically for an organization’s CISOs and senior-most executives. In addition to strategic insights presented by IANS Faculty, facilitated conversations and networking opportunities allow you and your CISO peers to share best practices in a trusted, closed-door environment.
Blog | Apr/24/2025
Third-party risk should be a top priority for security leaders, as organizations are increasingly vulnerable to supply chain attacks and cloud threats. Here, we examine key third-party risks and how security leaders can mitigate them.
Event | Jun/26/2025
According to Verizon’s 2024 Data Breach Investigations Report, ransomware remains the top threat across 92% of industries, with roughly one-third of all breaches involving ransomware or some other extortion technique. In this symposium, we’ll use digital forensics and incident response reports from real-world incidents to walk through the tactics, techniques and procedures of top ransomware gangs and share lessons learned to help you avoid the same fate.
Event | Jun/25/2025
Metrics continue to be a pain point in infosec—both in terms of getting a clear understanding of how the program is functioning and communicating that narrative across lines of business. At the center of this problem is the reality there is no one-size-fits-all solution. The best metrics are specific to your business context. In light of that, this session leans on fundamental best practices to help you pressure test your concepts.
OSZAR »