How the ISF supports APAC
Through legislation changes
How can the ISF make the journey to compliance a smooth one?
Emma Bickerstaffe & Alex Jordan
Principal Analysts, ISF
Senior Solutions Analyst, ISF
Supporting ISF Resources
Continuous Supply Chain Assurance: Monitoring supplier security
Suppliers help to keep operations moving for all organisations, but this also brings information risk that you must keep a watchful eye on.
Preparing for the General Data Protection Regulation
The European Union’s General Data Protection Regulation (the GDPR) brings data protection legislation into line with new, previously unforeseen ways...
Security Architecture: Navigating complexity
Establish common architectural concepts, avoid common pitfalls, and integrate architecture into your information security function.
Extinction Level Attacks: A survival guide
Extinction Level Attacks details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack.
Information Risk Assessment Methodology 2 (IRAM2)
IRAM2 is a unique methodology for assessing and treating information risk. It includes guidance for risk practitioners to implement the six-phase proc...