How the ISF supports APAC
Through legislation changes
How can the ISF make the journey to compliance a smooth one?
Emma Bickerstaffe & Alex Jordan
Principal Analysts, ISF
Senior Solutions Analyst, ISF
Supporting ISF Resources
Continuous Supply Chain Assurance: Monitoring supplier security
Supply chains are often huge, complex and challenging to manage. Large organisations have multiple thousands of suppliers, each of which have their ow...
Preparing for the General Data Protection Regulation
The European Union’s General Data Protection Regulation (the GDPR) brings data protection legislation into line with new, previously unforeseen ways...
Security Architecture: Navigating complexity
Budgetary investments in information security are under renewed scrutiny as organisations struggle to justify even the smallest spend.
Extinction Level Attacks: A survival guide
Extinction Level Attacks details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack.
Information Risk Assessment Methodology 2 (IRAM2)
IRAM2 is a unique methodology for assessing and treating information risk. It includes guidance for risk practitioners to implement the six-phase proc...