All Blogs
Showing 253-261 of 366
Identity and Access Management
Centralized IAM Best Practices
December 16, 2021
Organizations making significant investments in cloud services should plan to build a centralized IAM function and focus on five key principles. Here are best practices to follow and pitfalls to avoid when moving to centralized IAM.
IANS Faculty
Digital Transformation Driving CISO Maturation
December 15, 2021
Learn more about how IANS is helping aspiring security leaders and CISOs navigate the current digital transformation with our research-based Executive Competencies program.
Phil Gardner
Management and Leadership
IAM Roadmap Best Practices
December 14, 2021
Learn what a typical IAM roadmap entails and find best practices to ensure your IAM program supports the business efficiently and effectively.
IANS Faculty
Threats & Vulnerabilities
Modern Ransomware Requires More Than Just Good Backups
December 9, 2021
A strong backup solution will minimize the impact of ransomware attacks, but backups alone are not enough protection. Find best practices aimed at building a holistic data protection strategy that will help organizations avoid paying a ransom.
IANS Faculty
Infrastructure
Considerations for a Move from an E3 to E5 License for M365
December 7, 2021
Identify and understand key decision points to consider when evaluating a transition from M365 E3 licenses to E5 licenses for email hygiene, endpoint protection and eDiscovery/compliance.
IANS Faculty
Management and Leadership
Three Security Initiatives to Consider in 2022
December 2, 2021
As the end of the year approaches, security leaders are starting to plan their strategic and tactical roadmaps for the year ahead. Here is a list of three security initiatives to consider in 2022.
IANS Faculty
Security Operations
Key Server and Endpoint Security Metrics to Track
November 30, 2021
The most valuable server and endpoint security metrics for security teams tend to help improve the security program overall. Here is a list of key server and endpoint security metrics to use for reporting.
IANS Faculty
Security Operations
Guidance for Building a Security Data Lake
November 23, 2021
Understand how data lakes differ from SIEMs, and guidance for planning, building, and securing a security data lake.
IANS Faculty
Security Operations
How to Evaluate the Viability of a Data Lake for Security
November 18, 2021
Are data lakes a viable option for your security program? Gain a better understanding of data lakes and learn the advantages and challenges of implementing them for security.
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.