Content Type
Date Range
Blog | Sep/4/2025
In this new era of AI, CISOs must now balance the efficiency gains of AI with the inevitable risk artificial intelligence introduces.
Event | Sep/25/2025
A good implementation plan can mean the difference between a successful tool/service purchase and shelfware. In this webinar, IANS Faculty offer key guidance, including:
Involving the right people and earmarking the right resources
Setting achievable project milestones, and knowing when implementation is over and usage/optimization begins
Configuring the right metrics to ensure you gain value immediately and over time
Blog | Sep/2/2025
Setting up a strong GRC program is challenging. Learn key steps that will help establish a solid foundation for your organization’s program.
Blog | Aug/28/2025
IANS Research reviews the 12 high-level steps required for building a privacy program that meets the unique security goals of your organization and team.
Event | Nov/4/2025
Security architecture teams often face burnout from juggling too much engineering work or being pulled into non-architectural tasks. Misalignment with enterprise architects and challenges in demonstrating value to the organization further compound the problem. During this highly interactive event, IANS Faculty Wolfgang Goerlich will share his experience and expertise and facilitate peer-to-peer discussions that provide you actionable insights to elevate your architecture program to improve maturity, demonstrate value, and drive high-quality results
Tools & Guides | Aug/26/2025
This checklist is designed to help teams strengthen insider threat programs and outlines practical steps across governance, access, monitoring, and response—enabling faster detection, stronger defenses, and reduced organizational risk.
Blog | Aug/26/2025
Examine the pros and cons of common CISO reporting structures and find tips for pursuing the right balance based on the needs and structure of your organization.
Event | Aug/28/2025
As the Cybersecurity Information Sharing Act (CISA) 2015 faces potential expiration next month, organizations risk a significant reduction in threat intelligence sharing. This session will detail what’s included in the law, the implications of its potential lapse and proactive steps CISOs can take to maintain information flow and collaboration in uncertain times.
Blog | Aug/21/2025
Long regarded as a compliance-driven, check-the-box function, GRC is evolving into a strategic enabler that directly supports business goals, resilience, and sustainable growth.
Blog | Aug/19/2025
Effective insider threat programs require a cross-functional, HR-led approach grounded in legal oversight and careful governance to protect both the organization and its people while fostering trust and accountability.
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.