This session from Illumio and SEP2 will focus on how to implement zero trust principles to ensure critical business operations can continue during and after a cyber incident.
In this session we will define what the Dark Web is, what it is not, and who frequents this space and how it relates to the struggle around attribution.
This webinar examines why the traditional layered defense model is no longer sufficient in today’s threat landscape.
AI is reshaping how businesses build and innovate, but it also introduces new risks: data exposure, Shadow AI, pipeline misconfigurations, and insecure model usage.
In this webinar, Benoit Heynderickx and Luka Ivezic provided a clear update on these major EU regulations and explain how the ISF Standard of Good Practice for Information Security (SOGP) and related tools can support organisations in meeting compliance requirements.
In this session, Simon Cross, Enterprise Security Architect at Infoblox, will explore how organisations can evolve defence-in-depth by adding an extra layer of pre-emptive controls.
This webinar explores the intersection of current affairs and cyber risk, highlighting how global events from conflicts and climate disasters to AI-driven scams are reshaping the threat landscape and business operations.
This webinar will address that imbalance by highlighting the key opportunities and challenges posed by this evolution in the world of AI.
What would happen if your organisation’s most valuable information was compromised?
In this session, Javvad Malik, Lead Security Awareness Advocate at KnowBe4 will examine the ethical responsibility of organisations to ensure their employees are cyber resilient.
Discover how integrating diverse standards can enhance security controls and ensure comprehensive protection across global operations.
Learn to reduce redundancy, enhance due diligence, and monitor your entire vendor portfolio efficiently using third-party risk exchanges.
Explore with Mark Ward and Richard Absalom to understand global developments, identify new threats, and prepare your organisation for the future.
In this webinar, Lee Munson and Nikhil Stephen reflect on why AI security governance is struggling to keep up and who should be accountable and responsible for it.
Discover ISF Assure, a platform that swiftly identifies and mitigates key risks, ensuring cyber resilience and operational stability.
Get practical insights into new cybersecurity rules such as CRA, essential for anyone dealing with connected products in the EU.
Join Lauren Place from Wiz for a real-world case study and insights on effective cloud detection and response (CDR) methodologies to secure your cloud environments.
Discover how to build resilient supply chains with insights from Paul Holland and Niko Kalfigkopoulos. Learn key strategies on collaboration, addressing failures, and enhancing cybersecurity support.
Join Steve Dobson at ISF to learn how organisations can enhance cyber resilience, achieve compliance, and manage information security effectively.
Prepare for NIS2 regulation with our webinar. Learn core principles, country-specific challenges, and enhance cybersecurity practices.
Learn from this webinar why relying solely on technology for email security can leave your organisation vulnerable.
In this session you will find out how to make security awareness and how to create a culture that your team genuinely embraces.
In this session, we will explore how the ISF SOGP, related tools and resources can support organisations with their compliance journey.
With supply chain threats rising in complexity, securing vendor ecosystems has become critical to resilience.…
Steve Durbin provides insight into the prominent information security threats to expect in 2025 and crucial guidance on how to prepare.
Bernard Montel, EMEA Technical Director and Security Strategist at Tenable explores the evolution from vulnerability management to exposure management and main risks associated with cloud exposure.
In this session we will be focussing on AI adoption, key challenges for CISO and cyber managers and how to plan for business continuity.
ISF experts Nick Frost, Dan Rycroft and Jean-Michel Chapon share a comprehensive approach to policy development, stakeholder engagement, and alignment with budget cycles.
Discover how to future-proof your cyber security plans as Paul Holland reflects on what makes the ISF Threat Horizon series so accurate.
This session explores how current people, process and technology issues are leading to fragile cloud security operations for many organisations.
In this webinar, Principal Research Analyst Richard Absalom will provide tips on how organisations can move beyond raising awareness, to embedding security behaviours.
Join our in house EU regulatory expert Luka Ivezic, as he outlines NIS 2 Directves core challenges and the road to compliance.
Gain perspective on the critical challenges facing organizations worldwide and how to mitigate them with increasingly limited resources.
This session explores the trends shaping the API threat landscape today, including vulnerability exploitation, DDoS attacks, bot traffic.
Hear directly from Alex Jordan, Head of Tools & Methodologies, and Francesca Williamson, ISF Analyst, about the recently updated ISF Tools Suite that is aligned to the 2024 version of the ISF Standard of Good Practice (SOGP)
This session explores how a code-to-cloud approach can empower developers to move at the speed of the cloud without compromising security
Murky and cryptic details of cloud breaches and threats fill all cybersecurity news. Sorting through…
This session explores how advancements in machine learning technologies are empowering threat actors to create new attack vectors.
Over the last 2 years, 98% of organisations globally have had a 3rd party in…
Mani Keerthi Nagothu, Field CISO Associate Director shares explores how security teams can leverage AI to counterattack threat adversaries.
Steve Durbin, CEO of ISF, Eran Ashkenazi, Chief Customer Officer, and Jane Wong, SVP of Product Management at SentinelOne share their expertise on navigating the ever-changing threat landscape.
Gain exclusive insight as the ISF and SEC joined forces to cut through the noise surrounding their latest cyber security rules.
James McQuiggan, Security Awareness Advocate at KnowBe4 discusses the unforeseen threats of AI and how to protect your network.
ISF Principals Esther Schagen-van Luit and Mark Chaplin explore the business resilience landscape since COVID-19, presenting the key factors driving the need for cyber resilience in organisations.
In this session, ISF Analyst Francesca Wiiliamson will be discussing the potential benefits and drawbacks of implementing AI into our third-party relationships.
Security, at its core, is a data problem. As data volumes grow exponentially (to the…
Grant Bourzikas, CSO and Trey Guinn, CTO at Cloudflare explore the threat landscape facing security teams in Europe, and how to cope with rising volumes of incidents.
Benoit Heynderickx and ISF Member Ross Johnston explore the new features of SOGP 2024 and how they can be used in security policies, and procedures.
Tzachi Zorenshtain, Head of supply Chain Security at Checkmarx shares guidance on how to secure your apps with supply chain security best practices for vulnerable open source code and AI-generated hallucinations.
Shreya Tiwari and Daniel Norman share insight into the core components of Zero Trust and how organisations can embark on a Zero Trust journey.
Lee Munson explores AI advancements and potential perils including offensive/defensive AI, governance, ethics, and data privacy.
The ISF Cyber Security Showcase Week returns on 20 - 24 May 2024, presenting a lineup of engaging supply chain, zero trust and artificial intelligence webinars.
Dave Barnett Head of SASE at Cloudflare examines how AI's capabilities in data processing pose new challenges for data protection.
Josh Bartolomie, VP of Global Threat Service at Cofense, shares how to counter BEC threats with technical and people-centric strategies.
Jack Chapman, VP of Threat Intelligence, Egress discusses how inbound and outbound threats continue to evade traditional approaches to email security.
Join Ryan Kazanciyan, CISO at Wiz as he spotlights the critical need for enhanced visibility across cloud, data, and AI domains.
Jelle Wieringa, Security Awareness Advocate delves into destructive power of disinformation, and the ways AI is being used by bad actors to influence the masses.
Clint Gibler, Head of Security Research, Semgrap and guest speaker from Wiz, delves into current and future landscape of AI & Security
Discover the prominent information security threats to expect in 2024 and crucial guidance on how to fortify against them.
With more than 20% of all interactive intrusions associated with the exploitation of public-facing applications,…
Discover how the ISF SOGP is supporting leading global organizations in managing compliance across multiple standards and jurisdictions.
Join Benoit Heynderickx and Hui Shan as they explore how different ISF materials can be combined and used to effectively manage risk.
Join Mark Chaplin, ISF Principal as he provides insights into Cyber Exercises and the success factors and pitfalls that challenge organisations
Join Peter Watts, Cyber Security Specialist, to learn how to examine the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them
Join Arunoshi Singh and Daniel Norman as they highlight the most effective initiatives to transform behaviour and organisational culture.
Join Paul Watts for insights into how to accelerate a more positive change in the way security is perceived - unlocking its true potential.
Join Mark Ward in exploring the risks posed when asking AI tools to generate text, create images, write code or just search for information.
Join Steve Dobson as he breaks down the five key steps everyone can do to be better aware - and better protected - from attack.
Join Panorays as they analyse the benefits AI brings to the challenge of third-party security risk management and how to utilise it's power.
A series of informative webinars offering unique solutions to cyber challenges for audiences with all levels of security experience.
Mark Moore from CrowdStrike shares real-world stories of cloud attacks to explore the critical oversights leaving organisations vulnerable.
Industry experts discuss the rising significance and growth of asset discovery and the role of data quality and speed in decision-making.
Industry expert Jelle Wieringa about how you can better understand, measure and use your existing security culture to your advantage.
From build time to runtime, join SentinelOne as they discuss the complementary roles of agentless and agent-based security layers.
Nachiket Joshi from CrowdStrike explores embracing hybrid cloud environments against the backdrop of a continuously changing attack surface.
A panel webinar focussing on supporting and cultivating a community of aspiring female information security professionals.
A webinar exploring how the cross reference can help security practitioners deploy effective controls over their multi-cloud environments.
Watch as Dawid Kowalski from FireMon explores how to illuminate the blind spots and really protect your perimeter.
John Stock from Outpost24 provides insight into the most pressing threats in application security and how to effectively mitigate them.
A panel explore how stakeholders view the problem of phishing, and provide insight into how we can all start tackling this problem head-on.
Chief Executive of the ISF, Steve Durbin, took to the stage once again for our annual Emerging Threats webinar.
Gareth Haken provides insight into how the ISF's wealth of materials can be combined and used to effectively manage risk.
Bernard Montel from Tenable outlines the need for organisations to identify critical assets as soon as possible to reduce the risk of attack.
Where do CISOs find themselves today, and what changes should they be looking at to ensure their role continues to add value?
Jorge Ferrer Raventos from OneTrust discusses how to reinforce your IT risk program in a 'not if, but when' incident environment.
How can you better understand the threats your organisation faces, and make well-informed decisions about how to address them?
As threats gain in volume, Justin Pemberton explains how you can protect your business by deploying a modern approach to email security.
Dan Vasile provides a BlueVoyant perspective on what can be done to better protect organisations and their supply chains.
Paul Holland offers author's insight into the ISF research on ICS, and how you can understand and protect these often-critical environments.
A series of thought-provoking webinars addressing current business challenges with new and unique insight.
Steve Dobson explores how cyber threats manifest themselves today, how the ISF can help, and how we can all reduce the risk of cyber attack.
Elli Tsiala from ABN AMRO discusses defending against cyber threats that take advantage of large, complex and fast-changing supply chains.
SecurityScorecard offer an approach to ensuring a vendor's security posture is sufficient to prevent attacks and ensure information security.
A panel session discussing improving security behaviour and culture, featuring industry insight from experienced security professionals.
Darin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.
Former CISO Paul Watts reflects on where CISOs find themselves today, and how they can ensure their role continues to add value.
Daniel Norman details how you can design realistic, impactful cyber attack simulations and playbooks to strengthen your cyber resilience.
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.
Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.
Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.
Watch as Richard Absalom discusses considering security requirements during highly sensitive, fast-moving merger and acquisition activity.
Gareth Haken presents the key changes to the new ISO/IEC 27002:2022 release, and how the ISF Standard of Good Practice has been aligned.
Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.
Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.
Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.
Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.
Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…
Ransomware continues to be a clear and present danger for all organisations - as long…
Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.
The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…
Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…
With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right…
As Mobile Network Operators (MNOs) around the globe introduce and launch 5G systems, communications networks…
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
On Thursday September 30 at 18:00 BST, Benoit Heynderickx, Principal Analyst at the ISF will…
On Thursday 16th September at 13:00 BST, Benoit Heynderickx Principal Analyst at the ISF hosted…
On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…
The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.
Andy Jones, Distinguished Analyst at the ISF, spoke at the Special 5th Anniversary of the…
On Thursday 17th June, 15:00 BST, Paul Holland, Principal Research Analyst at the ISF spoke…
On Thursday 17th June, 10:00 BST, Benoit Heynderickx, Principal Analyst at the ISF took part…
Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.
The ISF is hosting a bespoke series of events for C-Suite/Senior Executive’s in the North American Finance, Pharma & Healthcare sector based on our recently released ISF report, Threat Horizon 2023: Security at a tipping point.
From 1pm BST, Steve Durbin, Chief Executive at the ISF will be joined by expert speakers to share their insights on the techniques cyber criminals are using to increase the effectiveness of their criminal activity.
Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.
ISF and Netskope are holding an exclusive virtual event on Thursday 6th May from 12.30 – 13.30 BST where we’ll be guiding you through an online SASE assessment.
This discussion set the scene of the dangers of ransomware; exploring the current trends, shifts in behaviour, criminal groups, who is being targeted, why ransomware leverages fear and how you can protect your organisation.
The ISF recently hosted a panel discussion with guests from Nokia and Skanska AB…
You use multiple network security controls in your organization, but chances are, they’re not talking…
As Organisations continue to adopt and embrace new technology platforms, it also brings with it…
Hear from Steve Durbin, Chief Executive of the ISF, as he explores the key topics of our Threat Horizon 2023 report.
During these unprecedented times, a large number of organisations had to shift their business operations…
On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…
Catch up on our recent roundtable event where our expert panel discussed how European insurance…
It is impossible to operate a business without having a supply chain. In the increasingly…
Ransomware is on the rise—there's no doubt about that. On Thursday 18th February, 14:00 GMT/15:00…
Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.
5G promises many new capabilities and use cases, making this technology the coming preferred platform for the digitalized world. That is why security and resilience of our telco networks will become even more critical in the future.
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally…
A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…
Organisations have been thrust into chaos, and the role of the Security Officer and security function is about to come under increasing pressure with a number of previously unanticipated scenarios and threats over the coming months.
Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…
Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…
The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives…
Catch up on our recent CxO webinar where the ISF were joined by industry experts…
Covid-19 has forced many companies to work remote which has increased their risk surface. On…
Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…
This session explores how organisations are being forced to deal with the new and often unplanned, reality of remote working.
Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…
Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…
Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…
Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative…