Content Type
Date Range
Blog | Jul/25/2023
Learn how to create security metrics that resonate with the board and senior leadership using an efficient cyber-risk quantification (CRQ) process.
Blog | Jul/18/2023
Find key insights and actionable guidance for CISOs exploring the prospect of pursuing board positions in three steps to access and refine soft skills, experience gaps and their brand.
Blog | Jul/13/2023
IANS Faculty member, Tanya Janca discusses pros and cons of DAST and SAST tools and provides guidance on how to select the right tools for your needs.
Blog | Jul/11/2023
Unlock the secrets to maturing your risk management function by effectively identifying value at risk, assessing threats, and implementing high-value controls. This comprehensive guide provides insights and strategies for aligning cybersecurity with business priorities.
Blog | Jul/6/2023
Understand how LLMs like ChatGPT lack adequate protections for data, content, and intellectual property. Find guidance for building LLMs policy and security controls from Aaron Turner, IANS Faculty.
Blog | Jul/4/2023
Learn how to develop a threat modeling program along with guidance to select a framework to reach threat modeling maturity.
Blog | Jun/29/2023
Use this actionable DevSecOps best practices checklist to educate yourself and your team. Discover how to avoid pitfalls and ensure overall program success.
Blog | Jun/27/2023
Understand risks that ChatGPT and large language models (LLMs) pose along with best practices to reduce usage impacts within your organization from Jake Williams, IANS Faculty.
Blog | Jun/20/2023
Gain an understanding of the key components of an effective executive-level InfoSec dashboard along with tips for including concrete actionable data.
Blog | Jun/13/2023
A ransomware attack can be disastrous, so it's important to be prepared. Learn how to create a 5-step ransomware incident response plan to mitigate harm.