Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research
Leadership Insights: Unlocking the business value of security
Explore the historic business perceptions holding back security, and discover steps security leaders can take to accelerate positive change.
Read moreThreat Horizon 2025: Scenarios for an uncertain future
Examine multiple contextual scenarios to help set strategies, prepare for potential threats and explore opportunities that lie ahead.
Read moreISF Resources to Establish Confidence In Your Cyber Resilience
Demonstrate that the appropriate measures are being implemented to embed cyber resilience best practice with key ISF resources.
Read moreTools
The Benchmark
Benchmark against peers to identify core areas of security that require attention and maximise return on investment.
Read moreStandard of Good Practice for Information Security
An internationally recognised set of good practice covering all aspects of cyber resilience, cloud security and information risk management.
Read moreISF Aligned Tools Suite
Strategic information risk management tools to assess risk, qualify supplier security and assure prioritised cyber security investment.
Read moreServices
Risk Practitioner Training
A high-impact learning programme to inspire the next generation of information security practitioners and leaders at your organisation.
GET IN TOUCHHuman-Centred Security Assessment
Determine the reasons behind poor security behaviour and engage your workforce to better protect your organisation with expert ISF support.
GET IN TOUCHPodcasts
Lost in Regulation: Bridging the cyber security gap for SMEs
Former civil servant Brian Lord examines the cybersecurity challenges and regulatory hurdles for SMEs within government supply chains.
From CISO to BISO and Back Again
Security leader Erhan Temurkan joins ISF analysts to dissect his journey from BISO to CISO and unpack what he saw along the way.
Handling and Hiring an Infosec Team
Keith Price, CISO at National Highways, Paul Watts and Mark Ward from the ISF, explore strategies for hiring and supervising Infosec teams.
Events
Upcoming Events
Security Middle East Conference
Join Daniel Norman, EMEA Regional Director at the ISF, as he chairs the upcoming Security…
Everything YOU Need to Know About Software Supply Chain Security
Tzachi Zorenshtain, Head of supply Chain Security at Checkmarx shares guidance on how to secure your apps with supply chain security best practices for vulnerable open source code and AI-generated hallucinations.
Building an Enterprise Data Strategy for the Modern SOC
Security, at its core, is a data problem. As data volumes grow exponentially (to the…
On-Demand Events
AI Frontiers in Cybersecurity: Navigating Opportunities and Threats in the Digital Landscape
Dave Barnett Head of SASE at Cloudflare examines how AI's capabilities in data processing pose new challenges for data protection.
This Time it's Personal: The latest trends in business email compromise
Josh Bartolomie, VP of Global Threat Service at Cofense, shares how to counter BEC threats with technical and people-centric strategies.
Ireland Chapter Spring Meeting 2024
Engage with local security leaders in Dublin, Ireland and share your cyber security experiences and solutions in a closed network.
Videos
CISOs, Warfare and Technology in the Spotlight
Journalist Nicholas Witchell puts Steve Durbin in the 'cyber hot-seat' for fifteen minutes of timely rapid-fire questions.
Watch nowProtecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it
Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…
Watch NowISF Interviews: Colonel Chris Hadfield meets Steve Durbin
Welcome to the Information Security Forum videocast series featuring interviews with world-renowned cyber experts and…
Watch nowNews
Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact
Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.
COSMICENERGY: A new threat to OT
Paul Holland provides insight into a possible new threat to operational technology environments, specifically those in the energy sector.
Top Risks and Best Practices for Securely Offboarding Employees
Outgoing employees pose significant security risks to organizations. Here are some of the major issues…