On-Demand Events
You moved your infrastructure to the Cloud - Do you know your Cloud Exposure?
Bernard Montel, EMEA Technical Director and Security Strategist at Tenable explores the evolution from vulnerability management to exposure management and main risks associated with cloud exposure.
Good AI Gone Bad - A Zero Trust Story
In this session we will be focussing on AI adoption, key challenges for CISO and cyber managers and how to plan for business continuity.
Improving your Policy Framework with the ISF's Standard of Good Practice for Information Security
ISF experts Nick Frost, Dan Rycroft and Jean-Michel Chapon share a comprehensive approach to policy development, stakeholder engagement, and alignment with budget cycles.
Through the Looking glass: ISF's predictions on past, present and future threats
Paul Holland, Head of Research, ISF, will share insight on how the accuracy of ISF's Threat Horizon predictions can help future cyber security planning.
How to build an anti-fragile Cloud SOC
This session explores how current people, process and technology issues are leading to fragile cloud security operations for many organisations.
Let’s Stop Talking About Security Awareness and Focus on Culture Instead
In this webinar, Principal Research Analyst Richard Absalom will provide tips on how organisations can move beyond raising awareness, to embedding security behaviours.
NIS 2 Directive: Addressing seven common challenges
Join our in house EU regulatory expert Luka Ivezic, as he outlines NIS 2 Directves core challenges and the road to compliance.
Protecting My Business on a Limited Budget
Gain perspective on the critical challenges facing organizations worldwide and how to mitigate them with increasingly limited resources.
Are you prepared for the next attack? The state of application security in 2024
This session explores the trends shaping the API threat landscape today, including vulnerability exploitation, DDoS attacks, bot traffic.
ISF Tools: A holistic approach to security
Hear directly from Alex Jordan, Head of Tools & Methodologies, and Francesca Williamson, ISF Analyst, about the recently updated ISF Tools Suite that is aligned to the 2024 version of the ISF Standard of Good Practice (SOGP)
Building with Confidence: Security from Code to Cloud
This session explores how a code-to-cloud approach can empower developers to move at the speed of the cloud without compromising security
Cyber Security Showcase Webinar Week 2024
A series of thought-provoking webinars addressing current security challenges with new and unique insight.
Evolution of Cloud Security Breaches: Building Cloud Defence
Murky and cryptic details of cloud breaches and threats fill all cybersecurity news. Sorting through…
Cyber Security in the AI Era
This session explores how advancements in machine learning technologies are empowering threat actors to create new attack vectors.
CISO Panel: Best Practices and Emerging Trends in Supply Chain Risk Management
Over the last 2 years, 98% of organisations globally have had a 3rd party in…
AI vs AI - How Adversaries and Security Teams use AI
Mani Keerthi Nagothu, Field CISO Associate Director shares explores how security teams can leverage AI to counterattack threat adversaries.
Building an Effective Security Strategy for the Threats of Today and Tomorrow
Steve Durbin, CEO of ISF, Eran Ashkenazi, Chief Customer Officer, and Jane Wong, SVP of Product Management at SentinelOne share their expertise on navigating the ever-changing threat landscape.
Decoding the SEC Cybersecurity Disclosure
Gain exclusive insight as the ISF and SEC joined forces to cut through the noise surrounding their latest cyber security rules.
The Dark Side of AI
James McQuiggan, Security Awareness Advocate at KnowBe4 discusses the unforeseen threats of AI and how to protect your network.
Untangling the Cyber Resilience Thread
ISF Principals Esther Schagen-van Luit and Mark Chaplin explore the business resilience landscape since COVID-19, presenting the key factors driving the need for cyber resilience in organisations.
The Influence of AI in Supply Chains
In this session, ISF Analyst Francesca Wiiliamson will be discussing the potential benefits and drawbacks of implementing AI into our third-party relationships.
Building an Enterprise Data Strategy for the Modern SOC
Security, at its core, is a data problem. As data volumes grow exponentially (to the…
Shielding the Future: Europe's cyber threat landscape report
Grant Bourzikas, CSO and Trey Guinn, CTO at Cloudflare explore the threat landscape facing security teams in Europe, and how to cope with rising volumes of incidents.
SOGP 2024: The all-encompassing Standard of Good Practice for Information Security
Benoit Heynderickx and ISF Member Ross Johnston explore the new features of SOGP 2024 and how they can be used in security policies, and procedures.
Everything YOU Need to Know About Software Supply Chain Security
Tzachi Zorenshtain, Head of supply Chain Security at Checkmarx shares guidance on how to secure your apps with supply chain security best practices for vulnerable open source code and AI-generated hallucinations.
Zero Trust Strategy: Why your organisation should adopt it
Shreya Tiwari and Daniel Norman share insight into the core components of Zero Trust and how organisations can embark on a Zero Trust journey.
AI Insights: Opportunities and challenges
Lee Munson explores AI advancements and potential perils including offensive/defensive AI, governance, ethics, and data privacy.
ISF Cyber Showcase Week - May 2024
The ISF Cyber Security Showcase Week returns on 20 - 24 May 2024, presenting a lineup of engaging supply chain, zero trust and artificial intelligence webinars.
AI Frontiers in Cybersecurity: Navigating Opportunities and Threats in the Digital Landscape
Dave Barnett Head of SASE at Cloudflare examines how AI's capabilities in data processing pose new challenges for data protection.
This Time it's Personal: The latest trends in business email compromise
Josh Bartolomie, VP of Global Threat Service at Cofense, shares how to counter BEC threats with technical and people-centric strategies.
Email Security in 2024: The urgent need to adapt your approach
Jack Chapman, VP of Threat Intelligence, Egress discusses how inbound and outbound threats continue to evade traditional approaches to email security.
The Cloud Security Playbook for Financial Services
Join Ryan Kazanciyan, CISO at Wiz as he spotlights the critical need for enhanced visibility across cloud, data, and AI domains.
The Superpower of AI: Unleashing mis- and disinformation at horrific scale
Jelle Wieringa, Security Awareness Advocate delves into destructive power of disinformation, and the ways AI is being used by bad actors to influence the masses.
AI & Cybersecurity: The current state of the art and where we're headed
Clint Gibler, Head of Security Research, Semgrap and guest speaker from Wiz, delves into current and future landscape of AI & Security
ISF Annual Threat Update: Emerging Threats for 2024
Discover the prominent information security threats to expect in 2024 and crucial guidance on how to fortify against them.
How well do you know your attack surface?
With more than 20% of all interactive intrusions associated with the exploitation of public-facing applications,…
A Unified Approach to Compliance
Discover how the ISF SOGP is supporting leading global organizations in managing compliance across multiple standards and jurisdictions.
Manage Risk the ISF Way
Join Benoit Heynderickx and Hui Shan as they explore how different ISF materials can be combined and used to effectively manage risk.
Lessons From the Frontline: What we learn from Cyber Simulation Exercises
Join Mark Chaplin, ISF Principal as he provides insights into Cyber Exercises and the success factors and pitfalls that challenge organisations
Threat Landscape 2023
Join Peter Watts, Cyber Security Specialist, to learn how to examine the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them
Human-Centred Security: Transforming security behaviours
Join Arunoshi Singh and Daniel Norman as they highlight the most effective initiatives to transform behaviour and organisational culture.
Unlocking the Business Value of Security
Join Paul Watts for insights into how to accelerate a more positive change in the way security is perceived - unlocking its true potential.
Surviving AI and Staying Safe
Join Mark Ward in exploring the risks posed when asking AI tools to generate text, create images, write code or just search for information.
Why Cyber Security is for Everyone
Join Steve Dobson as he breaks down the five key steps everyone can do to be better aware - and better protected - from attack.
Beyond Third-Party Security
Join Panorays as they analyse the benefits AI brings to the challenge of third-party security risk management and how to utilise it's power.
Cyber Security Showcase Week 2023
A series of informative webinars offering unique solutions to cyber challenges for audiences with all levels of security experience.
The Rise of the Cloud-Conscious Adversary
Mark Moore from CrowdStrike shares real-world stories of cloud attacks to explore the critical oversights leaving organisations vulnerable.
Cyber Asset Discovery: From 'nice-to-have' to mission critical
Industry experts discuss the rising significance and growth of asset discovery and the role of data quality and speed in decision-making.
Security Culture: Making cybersecurity an active part of your organization
Industry expert Jelle Wieringa about how you can better understand, measure and use your existing security culture to your advantage.
Shift Left, Shield Right: The role of CWPP in a CNAPP world
From build time to runtime, join SentinelOne as they discuss the complementary roles of agentless and agent-based security layers.
The Perfect Storm: Preparing today for the future state of cloud security
Nachiket Joshi from CrowdStrike explores embracing hybrid cloud environments against the backdrop of a continuously changing attack surface.
Why Women Should Choose Cyber
A panel webinar focussing on supporting and cultivating a community of aspiring female information security professionals.
Using the SOGP and CCM for Multi-Cloud Security
A webinar exploring how the cross reference can help security practitioners deploy effective controls over their multi-cloud environments.
Illuminate the Blind Spots: Why your security investments are failing
Watch as Dawid Kowalski from FireMon explores how to illuminate the blind spots and really protect your perimeter.
Threats to Watch Out For: A CISOs guide to application security
John Stock from Outpost24 provides insight into the most pressing threats in application security and how to effectively mitigate them.
Perspectives on Fighting Back Against Phishing Attacks
A panel explore how stakeholders view the problem of phishing, and provide insight into how we can all start tackling this problem head-on.
ISF Annual Threat Update: Emerging threats for 2023
Chief Executive of the ISF, Steve Durbin, took to the stage once again for our annual Emerging Threats webinar.
Managing Risk the ISF Way
Gareth Haken provides insight into how the ISF's wealth of materials can be combined and used to effectively manage risk.
How to Identify and Prioritise Attack Paths and Prevent their Exploitation
Bernard Montel from Tenable outlines the need for organisations to identify critical assets as soon as possible to reduce the risk of attack.
The Future CISO: Securing the digital organisation of tomorrow
Where do CISOs find themselves today, and what changes should they be looking at to ensure their role continues to add value?
Keeping Pace with Cybersecurity by Scaling IT Governance and Data Risk Management
Jorge Ferrer Raventos from OneTrust discusses how to reinforce your IT risk program in a 'not if, but when' incident environment.
Threat Intelligence: An evolving capability
How can you better understand the threats your organisation faces, and make well-informed decisions about how to address them?
The Modern Approach to Fight Phishing
As threats gain in volume, Justin Pemberton explains how you can protect your business by deploying a modern approach to email security.
Supply Chain Cyber Security - Industry Specific Insights
Dan Vasile provides a BlueVoyant perspective on what can be done to better protect organisations and their supply chains.
Collaborating to Shift Away from Shadow OT
Paul Holland offers author's insight into the ISF research on ICS, and how you can understand and protect these often-critical environments.
Cyber Security Showcase Week 2022
A series of thought-provoking webinars addressing current business challenges with new and unique insight.
Cyber for All: Why cyber is for everyone
Steve Dobson explores how cyber threats manifest themselves today, how the ISF can help, and how we can all reduce the risk of cyber attack.
Countering Supply Chain Attacks: Where next?
Elli Tsiala from ABN AMRO discusses defending against cyber threats that take advantage of large, complex and fast-changing supply chains.
Cyber Security Ratings Are a Thing, What Do I Do Now?
SecurityScorecard offer an approach to ensuring a vendor's security posture is sufficient to prevent attacks and ensure information security.
Strengthen Your Security Culture: A CISOs perspective
A panel session discussing improving security behaviour and culture, featuring industry insight from experienced security professionals.
Innovating Defence: The life of a Risk Operations Centre (ROC) Analyst
Darin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.
The Future CISO: Securing the digital organisation of the future
Former CISO Paul Watts reflects on where CISOs find themselves today, and how they can ensure their role continues to add value.
Preparing for a Cyber Crisis: The ISF approach
Daniel Norman details how you can design realistic, impactful cyber attack simulations and playbooks to strengthen your cyber resilience.
Optimising Third-Party Risk
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.
Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.
Implementing a Zero Trust Strategy: The ISF approach
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.
Cloud Native Security: The runtime security imperative
Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.
Extending the SOC: What's Next in Security
Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.
Top 5 Board Level Concerns for Zero Trust
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.
The Role of Information Security in Mergers and Acquisitions
Watch as Richard Absalom discusses considering security requirements during highly sensitive, fast-moving merger and acquisition activity.
Detailing the Major Structural Changes in ISO27002:2022
Gareth Haken presents the key changes to the new ISO/IEC 27002:2022 release, and how the ISF Standard of Good Practice has been aligned.
Taking a Holistic View of Cybercrime: ISF and European Commission report
Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.
Living in the New Normal: Which are the Main Threats for 2022?
Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.
Managing Cyber Risk Across your Extended Vendor Ecosystem
Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.
Mitigating Ransomware Attacks
Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.
ISF Annual Threat Update: Emerging Threats for 2022
Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…
Ways to survive the ransomware menace
Ransomware continues to be a clear and present danger for all organisations - as long…
ISF Annual Threat Update Emerging Threats for 2022
Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.
The ultimate guide: Reduce risk with your software security initiative
The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…
Trusted Third-Party Risk Management
Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…
How to stop Phishing Threats for Office 365
With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right…
5G Security Standardisation and Knowledge Base
As Mobile Network Operators (MNOs) around the globe introduce and launch 5G systems, communications networks…
Human-Centred Security: Effectively managing behaviour
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
The Challenges of Multi-Cloud and Hybrid Security
On Thursday September 30 at 18:00 BST, Benoit Heynderickx, Principal Analyst at the ISF will…
How do you monitor your cloud controls in a multi-cloud environment?
On Thursday 16th September at 13:00 BST, Benoit Heynderickx Principal Analyst at the ISF will…
Threat Horizon: Emerging Cyber Risks for APAC
On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
Ransomware in Focus
Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…
A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk
The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.
Resistance is futile: Embracing the age of the cyber weapon
Andy Jones, Distinguished Analyst at the ISF, spoke at the Special 5th Anniversary of the…
Secure Access Management: Modernise your IT Infrastructure by Maximising Productivity and Minimising Friction
On Thursday 17th June, 15:00 BST, Paul Holland, Principal Research Analyst at the ISF spoke…
2021 Threat Trends: Ransomware
On Thursday 17th June, 10:00 BST, Benoit Heynderickx, Principal Analyst at the ISF took part…
Why Zero Trust Starts with Identity Security
Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.
North American Threat Horizon Workshop Series: ISF Predicts 2023 – Building Resiliency
The ISF is hosting a bespoke series of events for C-Suite/Senior Executive’s in the North American Finance, Pharma & Healthcare sector based on our recently released ISF report, Threat Horizon 2023: Security at a tipping point.
Today’s cybercrime pandemic and what to do about it
From 1pm BST, Steve Durbin, Chief Executive at the ISF will be joined by expert speakers to share their insights on the techniques cyber criminals are using to increase the effectiveness of their criminal activity.
Extinction Level Attacks: Surviving Ransomware and Nation States
Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.
What is your SASE architecture missing?
ISF and Netskope are holding an exclusive virtual event on Thursday 6th May from 12.30 – 13.30 BST where we’ll be guiding you through an online SASE assessment.
Ransomware: It really is everywhere
This discussion set the scene of the dangers of ransomware; exploring the current trends, shifts in behaviour, criminal groups, who is being targeted, why ransomware leverages fear and how you can protect your organisation.
Managing Supply Chain Risk the ISF Way
The ISF recently hosted a panel discussion with guests from Nokia and Skanska AB…
Change Automation: Turning Network Security Alerts into Action
You use multiple network security controls in your organization, but chances are, they’re not talking…
Why a Zero Trust model is driving an Identity Centric Security Strategy
As Organisations continue to adopt and embrace new technology platforms, it also brings with it…
ISF Predicts 2023: Building resilience for an uncertain future
Hear from Steve Durbin, Chief Executive of the ISF, as he explores the key topics of our Threat Horizon 2023 report.
Managing Operational Risk in a Downturn
During these unprecedented times, a large number of organisations had to shift their business operations…
Cloud Security – a dynamic approach to cloud risk monitoring and reporting
On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…
Managing Information Risk: Insurance Industry Roundtable
Catch up on our recent roundtable event where our expert panel discussed how European insurance…
Continuous Supply Chain Assurance: Always know your risk
It is impossible to operate a business without having a supply chain. In the increasingly…
Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware
Ransomware is on the rise—there's no doubt about that. On Thursday 18th February, 14:00 GMT/15:00…
Positively Influencing Security Behaviour: Human-Centred Security
Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.
Why 5G security standards are so important and what is the latest progress?
5G promises many new capabilities and use cases, making this technology the coming preferred platform for the digitalized world. That is why security and resilience of our telco networks will become even more critical in the future.
Human-Centred Security: Managing the insider threat
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally…
A Wizards Guide to Security in the Cloud
A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…
Emerging Cyber Threats for 2021
Organisations have been thrust into chaos, and the role of the Security Officer and security function is about to come under increasing pressure with a number of previously unanticipated scenarios and threats over the coming months.
Assess. Comply. Assure: Eight Cyber Challenges in an Uncertain World
Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…
ISF: Managing Human risk in times of uncertainty
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…
CxO webinar series: Managing information risk from critical suppliers
Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…
BSIMM11: Here’s What’s New!
The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives…
CxO Webinar Series: Digital transformation in the Oil & Gas industry for the modern cyber security landscape
Catch up on our recent CxO webinar where the ISF were joined by industry experts…
Subnet Masks Required: How Covid-19 is changing the cyber security landscape
Covid-19 has forced many companies to work remote which has increased their risk surface. On…
CxO webinar series: Recovery – Cyber Insurance: Making sure you are covered & bouncing back
Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…
CxO Webinar Series: Containment – The Ultimate Incident Response Exercise: Are you remotely ready?
This session explores how organisations are being forced to deal with the new and often unplanned, reality of remote working.
CxO webinar series: Detection & Analysis – Stories from the front lines
Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…
CxO webinar series: Preparation – Communicating in a Cyber Crisis
Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…
CxO webinar series: Cyber Resiliency – Reaping the Benefits
Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…
Legal and Regulatory Implications for Information Security
Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative…