Skip to content
ISF Information Security Forum
  • Solutions and Insights
  • Spotlight on…
  • Our Services
  • Events
  • Contact
  • Become a member
Search ISF
Member Login - ISF Live

Search ISF

Search Results for: mark ward

Mark Ward

Mark has also provided guidance on the emergence of next-generation CISOs and is currently investigating how to make information security governance more engaged and effective. Before joining the ISF, Mark…

Leave a Comment on Mark Ward
podcast

Threat Horizon: Exploring the futures

…Brook and Mark Ward to explain the power scenarios have in helping security practitioners see beyond present problems and plot a path to a future that benefits everyone in the…

podcast

How History and Language Influence Infosec

Security practitioners and business leaders often seem like a community divided by a common language. Former historian Jemina Lakka-Kolari joins ISF analysts Paul Watts and Mark Ward to explore the…

podcast

Lessons Learned: How CISOs must change their strategy to survive

Expanding upon many of the themes addressed in his book ‘Rethinking InfoSec’, Greg van der Gaast, CISO at Scoutbee, joins ISF Senior Analyst, Mark Ward, for another instalment of the…

podcast

Keeping the Bad Guys at Bay

…plugged. Raj Samani, Chief Scientist at Rapid7 joins ISF Analysts Lee Munson and Mark Ward to debate the best way security leaders and their teams can prioritise patching.   What…

podcast

Handling and Hiring an Infosec Team

…Highways, and cyber security veteran, delves into the many ways to hire and oversee InfoSec professionals alongside Distinguished Analyst Paul Watts and Senior Analyst, Mark Ward from the ISF. …We…

podcast

Threat Horizon: Putting the social in media

…older cohort. ISF researchers and analysts Arunoshi Singh, Scott Binning and Ayesha Sayyad educate Mark Ward on living with social media. Detailing the digital detox and the connections they maintain…

podcast

Roles and Rewards: How the role of the CISO is changing

ISF Analysts Paul Watts and Mark Ward expand upon the fallout of the pandemic on cyber with Monica Verma, CISO at the Norwegian Directorate of Health. Monica and the panel…

podcast

Threat Horizon: Future gazing

…of Threat Horizon. Listen as ISF Analysts Max Brook, Richard Absalom and Mark Ward debate how the uncertainties and changes born from these trends will shape the near future. …I…

podcast

Threat Horizon: All threats, all the time

…cope are debated by Paul Watts, Richard Absalom and Mark Ward in this threat-themed podcast. Paul shares his formative experiences from the last big crisis he weathered – the 2008…

news

What Skills Will Cybersecurity Leaders Want in 2021?

All infosec teams have been under huge pressure lately and good CISOs acknowledge that and look for ways to help staff handle the stress Mark Ward, Senior Research Analyst at…

Leave a Comment on What Skills Will Cybersecurity Leaders Want in 2021?
podcast

The Promise and Peril of AI

…or a troubling development for information security and the wider business, is debated by technology and security expert Yngvar Ugland with ISF research analysts Lee Munson, Mark Ward and ISF…

podcast

Once Upon a Time in Infosec

…to Mark Ward and Paul Watts, how he developed an epic tale of King Infosecios and his three daughters Peoplia, Processia and Technia, to illustrate the concept of people, processes,…

podcast

Balancing Human Insight with AI in Marketing

In this week’s episode, Steve sits down with Debra Andrews, president and owner of Marketri, a strategic marketing firm. Steve and Debra discuss how to balance Human Insight with AI…

podcast

Spreading the Word on Good Books

…Paul Watts and Mark Ward talk about their favourite books on cyber security principles, data privacy and cross-cultural management. … Unfortunately, a lot of that data is easily hackable, and…

news

What Can Businesses Learn from the Cyber Security Challenges of Coronavirus

…Mark Ward, Senior Research Analyst at the ISF The coronavirus pandemic has seen a dramatic increase in cyber crime. Research from cybersecurity firm Checkpoint shows there were an estimated 200,000…

Leave a Comment on What Can Businesses Learn from the Cyber Security Challenges of Coronavirus
podcast

Exploring Careers in Information Security

ISF Principals Bharat Thakrar and Mark Chaplin join Mark Ward to begin a series dedicated to shedding light on a career in information security. The conversation covers their personal paths…

event

From Geopolitics to Deepfakes: Navigating threats in a turbulent world

…Mark Ward and Francesca Williamson, explored and provided guidance on: The impact of global events and rising geopolitical tensions is having on cybersecurity Emerging AI related threats, such as AI-generated…

podcast

The Great CISO Debate

Experience an exclusive session from the ISF World Congress in Rotterdam where Mark Ward assembled an accomplished panel of experts to dissect the past, present and future role of the…

Mark Chaplin

Mark is an accomplished risk management professional with more than 30 years of experience in multiple disciplines, including risk governance and assurance, business resilience, security standards and oversight, compliance management,…

Privacy Notice

…for seven years from our last interaction. Event attendees’ information is usually kept for three years to enable follow-up activities and future event marketing, whilst marketing contacts’ data is retained…

podcast

What ChatGPT did next

…– Patricia Rodrigues alongside ISF analysts Paul Watts and Mark Ward talks about how she uses it and debates what its ultimate impact will be. It’s a tool, it doesn’t…

podcast

Keeping Abreast of Cyber Threats

ISF Analysts Paul Watts, Max Brook, Lee Munson and Mark Ward further expand upon the latest ISF Threat Intelligence: React and prepare report to talk everything ‘threats’. The panel break…

podcast

Threat Horizon 2024: How dirty is your data?

This Analyst Insight podcast sees ISF Analysts Richard Absalom, Mark Ward and Max Brook continue breaking down this year’s Threat Horizon 2024: The disintegration of trust report released to Members…

podcast

Threat Horizon 2024: The cyber crime underworld

ISF Analysts and authors of the latest Threat Horizon 2024: The disintegration of trust report, Mark Ward and Max Brook, speak with James Chappell from security firm, Digital Shadows, to…

podcast

Threat Horizon 2024: Where did the trust go?

This Analyst Insight podcast sees ISF Analysts Max Brook, Mark Ward and Paul Watts discuss the background to this year’s Threat Horizon 2024: The disintegration of trust report. The first…

podcast

Threat Horizon 2024: Themes and variations

ISF Analysts Mark Ward, Paul Watts and Richard Absalom highlight the four key themes underpinning the recent release of Threat Horizon 2024: The disintegration of trust. The second in a…

podcast

Into the Breach: Exploring the British Library incident

…with ISF analysts Paul Watts and Mark Ward. Together, they dive into a comprehensive discussion examining the report on the breach at the British Library in the UK. Listen as…

podcast

Threat Horizon: All about AI

…the organisational context such as artists and creators? Musician, performer and broadcaster LJ Rich explores the promise and peril of AI tech tools alongside ISF analysts Paul Watts and Mark…

podcast

AXA Spreads the Word on Security Careers

…studying computer science. Providing his first-hand perspective is Benoît de Lavignère, one of the program’s first successful recruits. The conversation culminates with insightful questions from Richard Absalom and Mark Ward…

podcast

Taking the Lead in Security

…Burns-Peake and experienced former CISO Paul Watts, engage in a discussion on strategies for establishing a favorable early reputation and fostering constructive relationships rather than risking alienation. Mark Ward serves…

podcast

Exploring Careers: Security testing

…job entails at beginner, intermediate and expert levels. ISF Principal Bharat Thakrar and Analyst Mark Ward put the questions to the trio in this second of a series exploring infosec…

podcast

Mapping the Future of AI

…Max Brook and Mark Ward are joined by AI expert David Sully from Advai to explore how the use of AI is likely to shape the future of our professional…

podcast

What They Don’t Teach in CISO school

…talk to ISF analysts Paul Watts and Mark Ward about the lessons he learned and how he applies them. “ … the academic route into our industry is not the…

podcast

How Governance Can Guide the CISO

Director of Cyber Security Governance at Danone, Lies Alderlieste, joins ISF Analysts Mark Ward and Paul Watts to provide counsel for security leaders embarking on a governance journey. Lies and…

news

EXPERT OPINION: Resilient by design is the way forward

…and doing this starts with a robust security framework, creating a structure that enables effective measurement of the programme. Using a security healthcheck or ISF Benchmark can allow the security…

podcast

Laying Down the Law on AI

…use AI. Policy experts and AI wranglers, Steve Dorward and Verona Johnstone-Hulse, joined ISF analysts Lee Munson and Mark Ward to take a look at the ever-growing roster of regulations…

podcast

BONUS: Ellie Pavlick – Balancing the Risk and Reward of AI

AI models have long been a staple in academic circles, but their recent rise in popularity has sparked essential conversations about its’ future implications on businesses. In this bonus episode,…

research

Engaging with The Board: Balancing cyber risk and reward

When boards and CISOs engage successfully, organisations are better able to take advantage of the opportunities presented by cyberspace and today’s information technology while addressing the associated risk. The full…

podcast

Balancing the Risk and Reward of AI

Whilst AI models have circulated academic settings for years, their recent surge in popularity have ignited a crucial discussion about their future. Listen as Ellie Pavlick, professor at Brown University…

podcast

Threat Horizon 2024: Risk and reward

Amanda Hallett and Karan Randhawa from Maersk offer industry insight into how they use the Threat Horizon report in their internal threat monitoring systems – providing great context to the…

research

Department Finance Benchmark 2024

Drive cost-effectiveness and propel your business forward with insight from 200 leading global organisations. We’ve partnered with Winmark to bring you a powerful new C-suite department benchmarking report that equips…

event

Cyber Asset Discovery: From ‘nice-to-have’ to mission critical

…actors. This panel session features ISF Analyst, Mark Ward in conversation with: Peter West – Assistant Head Defensive Cyber Organisation at UK Ministry of Defence, with 20 years’ experience across…

podcast

Cyber Insurance and the danger of ‘silent cyber’

ISF Senior Analysts Mark Ward and Emma Bickerstaffe in conversation with Simon Meech, Cyber Practice Lead at insurance broker BMS Group. The incessant onslaught of ransomware attacks presents challenges for…

event

The Future CISO: Securing the digital organisation of tomorrow

https://www.youtube.com/watch?v=Us0exCM1jg0   Following a turbulent two years, former-CISO and Distinguished Analyst at the ISF, Paul Watts, and Mark Ward, Senior Research Analyst at the ISF, are considering key recommendations for…

podcast

A Regular Review of Research

…Principal Research Analyst Richard Absalom joins Senior Analyst and podcast host Mark Ward to discuss in detail what’s changing with ISF Research. Richard and Mark outline what Members can expect…

event

Denmark Chapter Autumn Meeting 2024

Our next Denmark Chapter Autumn Meeting will be held on Wednesday 25 September 2024. These meetings provide ISF Members with the unique opportunity to engage with local security professionals in…

tool

The Benchmark

A strategic tool that security teams across the globe are using to improve cyber security. By assessing security performance across a range of different environments, the ISF Benchmark enables organisations…

event

Denmark Chapter Spring Meeting 2024

Our next Denmark Chapter Spring Meeting will be held on Thursday 14 March 2024. These meetings provide ISF Members with the unique opportunity to engage with local security professionals and…

event

Denmark Chapter Spring Meeting 2025

Our next Denmark Chapter Spring Meeting will be held on Thursday 13 March 2025 Held in English, these meetings provide ISF Members with the unique opportunity to engage with local…

event

Denmark Chapter Autumn Meeting 2025

Join us for the upcoming Denmark Chapter Autumn Meeting on Thursday, September 25, 2025. This event, conducted in English, offers ISF Members a valuable chance to connect with regional security…

news

A response to planned data protection changes

…economies such as Kenya, India, Brazil and Indonesia also called out as markets of interest to the UK. As the UK chases a Brexit dividend to open up non-EU markets…

news

How To Prepare Your Business As Worldwide Recession Looms

…the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he…

Leave a Comment on How To Prepare Your Business As Worldwide Recession Looms
research

The CISOs Role During Periods of Instability

Five Proactive Steps Towards Stabilisation In an increasingly interconnected, data‑driven world, any period of destabilisation has the potential to cause unforeseen consequences to organisations wherever they may reside or operate….

news

EXPERT OPINION: It’ll never happen to us

…as with all risk, some risks can be positive, and some can be negative. Predicting a market shift and pivoting to exploit that position was a risk-based decision that paid…

podcast

How to be a BISO

Just what does a BISO do all day, and how much does it differ to that of a CISO? ISF Distinguished Analyst Paul Watts and ISF Analyst Mark Ward try…

podcast

Creating a CERT on Jersey – Part Two

…Dear InfoSec host Mark Ward. Matt shares further insight into the set-up of a Computer Emergency Response Team and the issues associated with running the centre. He also shares his…

podcast

Cyber Threats: Old and new

…Paul Ducklin, security podcaster Alice Violet and ISF analysts Lee Munson and Mark Ward debate if anything has changed or we are stuck in the same cycle of risks and…

Malice, money and good management

Scammers, cyber-thieves and computer criminals are not far behind pornographers when it comes to exploiting technology innovations for their own purposes. Every time technology takes a leap forward, enterprising hackers…

Leave a Comment on Malice, money and good management
podcast

BISO or CISO – Which one should you hire?

…Tanner debates the difference between the two, and when an organisation should go hunting for each one with ISF analysts Paul Watts and Mark Ward. ​   …As you start…

podcast

From CISO to BISO and Back Again

…being a CISO? Security leader Erhan Temurkan joins ISF analysts Paul Watts and Mark Ward to dissect his journey from BISO to CISO and unpack what he saw along the…

podcast

Exploring Careers: Security audit

…Analyst and podcast host Mark Ward, along with ISF Principal Consultant Bharat Thakrar, to discuss auditing. Together, they delve into the role, its responsibilities, misconceptions about auditors, potential future developments,…

research

Becoming a next-generation CISO

…the rise of the next-generation CISO, a security professional who is adapting to the new environment, mastering new skills and advancing the discipline of information security. Written by Mark Ward,…

podcast

Research in 2024

Looking ahead to 2024, the ISF research team sit down to reveal what themes they will be looking into over the next 12 months. Listen as Mark Ward, Richard Absalom,…

event

Grasping for Control: The future threat landscape

What emerging threats should your organisation prepare for by 2027? Join the authors of ISF Threat Horizon 2027, Mark Ward and Richard Absalom, to explore how global developments will remake…

podcast

Dear Infosec: Can you help?

…episode of the re-branded podcast, host Mark Ward, along with Paul Watts; ISF Members Iwona Muchin and Erhan Temurkan, delve into problems submitted by listeners. They debate how technical is…

news

A return to the office is not a return to normal

Perhaps the biggest change that CISOs need to accept is that hybrid working is how it will be from now on. There’s no going back. Mark Ward, ISF Senior Analyst…

podcast

Desert Island Risks

…of Dear Infosec, ISF’s Mark Ward and Paul Watts, discuss the pivotal events and formative experiences that have shaped the life and career of Petri Koivisto, a seasoned security leader…

podcast

Threat Horizon: Net gains and losses

…Said School, and ISF analyst Mark Ward examine the role of Australia’s internet overseer and explore how the internet might change, along with who stands to gain or lose.  …

podcast

Creating a CERT on Jersey – part one

…impact it has had since its creation. ISF Distinguished Analyst, Paul Watts and ISF Senior Analyst, and Dear Infosec podcast host, Mark Ward test his responses. …One of the compromises…

event

CSO Security Summit UK 2024

…session with ISF Senior Research Analyst, Mark Ward, as he and other security professionals explore the global society’s influence on rising cyber security challenges. Closing Panel: The Power of Community…

event

Surviving AI and Staying Safe

…better job rather than expose them, and their employer, to unknown or unforeseen risks. Mark Ward is a Senior Research Analyst at the ISF and has written papers on future…

news

Follow Pragmatic Interventions to Keep Agentic AI in Check

…is straightforward. When designed responsibly, these systems can automate complex, multi-step processes that today require orchestration across people and tools. Incident response, threat hunting and routine decision-making are natural first-use…

event

Top 5 Board Level Concerns for Zero Trust

…Kapil Raina, a cybersecurity marketing executive of 20+ years, has built and led product, marketing, sales, and strategy teams at startups and large brands such as VeriSign, VMware, and Zscaler….

podcast

Redefining Data to Reinvent the Market Economy

Professor of Information Systems at the London School of Economics, Jannis Kallinikos, joined ISF Chief Executive Steve Durbin to challenge the traditional view of data as merely statistics. From reshaping…

video

Benchmark in Bitesize

Do your security controls measure up? Gain a comprehensive view of how ISF can support you in reviewing performance against your industry peers and industry frameworks with this four minute…

news

EXPERT OPINION: The bigger they are, the harder we will all fall

…that mean? The reality is that we live in an increasingly interconnected digital world that we do not completely understand, nor truly control. In parallel, we have seen a marked…

news

10 Cognitive Biases that can Derail Cybersecurity Programs

…been studied at length by psychologists and used in advertising, sales, marketing and other sectors. But the impact of cognitive biases in cybersecurity is often neglected or isn’t studied in…

news

Is the IT Sector Beset by Fear-Mongering?

…do with the marketing of a product, which is driven by suppliers competing against their market rivals in a saturated industry, as it is to do with the range of…

news

Information Security Forum Addresses Global Security Issues at 31st Annual World Congress

…cyber security in the boardroom, effective risk management post pandemic, human-centred security and the ISF’s trademark, forward looking threat assessment, Threat Horizon 2023. This year’s event included thought provoking and…

Leave a Comment on Information Security Forum Addresses Global Security Issues at 31st Annual World Congress
news

Infosecurity Magazine Q&A: Steve Durbin

…security industry, he graduated with a degree in French and studied for his Chartered Institute of Marketing qualifications before moving into the working world. What was your route into the…

Leave a Comment on Infosecurity Magazine Q&A: Steve Durbin
podcast

Celebrating Infosec and the Podcast

Today marks the 50th episode of the Analyst Insights podcast! This milestone episode celebrates the positives of working in InfoSec. Drawing on testimonies from previous guests, Patric Versteeg and Mike…

podcast

When InfoSec Gets Personal

…teams, everybody, on security. Not just by saying no, but how can I help you to get better? How can I help the company to move forward whilst maintaining security?……

news

EXPERT OPINION: Stop Talking About Security Awareness – Let’s encourage secure behaviour and culture instead

…at the board and C-suite level, and the hallmark of successful change programmes everywhere is having champions and consistent messaging at that level. Put together, all of the actions recommended…

news

World Economic Forum Global Risks Report Highlights Dangers of Digital innovation

…be the first in the market, and the absence of global security governance. The need for security by design is well understood. “Today, we are able to discover, assess, quantify…

Leave a Comment on World Economic Forum Global Risks Report Highlights Dangers of Digital innovation
news

Cyber Insurance: An effective use of your scant security budget?

…under that duvet!)? The cyber insurance market was worth approximately $7bn in 2020. This is expected to triple to more than $20bn by 2025. Despite the projected growth, the market…

Privacy Policy

…questions relating to your rights, please contact us by using the details set out in the “Contact” section below. You can also unsubscribe from any direct marketing by clicking on…

research

Cyber Insurance:
Is it worth the risk?

…enables you to navigate the intricacies of the market and complexities of a cyber insurance policy by: Clarifying the type of financial losses covered by cyber insurance Outlining key considerations…

news

Is cyber insurance a worthwhile investment?

Here are five questions to help determine if your company needs cyber coverage. The cyber insurance market is rapidly maturing and there are many reasons for this. Companies are increasingly…

podcast

The Cost of the FUD Approach to Security

In this episode, ISF Chief Executive, Steve Durbin speaks with Mark Ralls, President and COO of Invicti Security – a Texas-based company that provides dynamic web application security solutions. They…

Invasive Technology Disrupts the Everyday: Behavioural analytics trigger a consumer backlash

…Marketing and Advertising sector: Organisations will begin utilising the data from sensors and cameras to create tailored content around marketing and advertising products. Behavioural analytics will create ‘data doubles’ as…

Leave a Comment on Invasive Technology Disrupts the Everyday: Behavioural analytics trigger a consumer backlash
event

Untangling the Cyber Resilience Thread

…Luit and Mark Chaplin explore the business resilience landscape since COVID-19, examine what has changed and highlight the cyber risk consequences for organisations already dealing with uncertainty from multiple directions….

news

Eurasia Risks 2020: Exacerbation of the Battle for Technological Dominance

…strategy not only as a major element of competition in high-tech markets but also as a strategic challenge to US global leadership. In this context, the US trade war against…

Leave a Comment on Eurasia Risks 2020: Exacerbation of the Battle for Technological Dominance
news

AI governance demands a new era of board oversight

…CISO must coordinate with CEOs, CFOs and board members, while also working with marketing, product development and legal teams. To keep up with rising expectations, CISOs must shift from delivering…

news

ISF Resources to Support the NIST Cybersecurity Framework 2.0

…matter of time before this national framework became an international benchmark. Thus, the updates to the CSF acknowledge this new reality, where the CSF 2.0 has outgrown its original purpose….

The Role of the CISO during the Board Meeting

…meeting the needs of Chief Information Security Officers and other business leaders. Examples include: Engaging with the Board: Balancing cyber risk and reward Information Security Strategy: Transitioning from alignment to…

Leave a Comment on The Role of the CISO during the Board Meeting

Your Vulnerability is Someone Else’s Pay Cheque

…to look at vulnerabilities (also known as a vulnerability reward program (VRP)). Many large multi-national corporations already operate these programmes (e.g. Apple, Google, Facebook and Uber). A bug bounty is…

Leave a Comment on Your Vulnerability is Someone Else’s Pay Cheque
news

2020 Work-for-Home Shift: What We Learned

…remote-work shift for security teams going forward. A Mobile-Focused Security Policy is a Must As workers went home, mobile devices became more ascendant, with many of the new go-to collaboration…

Leave a Comment on 2020 Work-for-Home Shift: What We Learned
event

Securing the Supply Chain: Navigating Risk and Regulatory Demands in an Interconnected World

…expertise in data analytics, Stephen brings a forward-looking perspective to tackling today’s most pressing cybersecurity challenges. Christoph Schacher leads the security for Wienerberger AG, one of the world’s most established…

news

Five Threat Vectors Destined To Make Waves In 2021

…newly emerging landscape required swift innovation and forward-thinking organizations seized the opportunity to reevaluate infrastructure and policy. With the dust settling, it’s time to turn our eyes toward the year…

Leave a Comment on Five Threat Vectors Destined To Make Waves In 2021
podcast

The Future of Digital Governance

…cyberspace is possible going forward. I think privacy by design will become more important when we go to the development of AI, because at a certain moment, the insecurity of…

news

Prepare, respond, resume

…forward. In many, if not all cases, extreme cyber attacks are a perfect opportunity for organisations to secure future budget for resilience and recovery-based initiatives, such as overhauling legacy systems…

podcast

Fuelling Business Growth With Modern Security Leadership

Erik Avakian, a former US State CISO, joins ISF CEO Steve Durbin to discuss the ever-evolving role of CISOs, emphasising their need to be business partners rather than just gatekeepers….

news

5 Levers Lawmakers Can Use to Tackle Cybercrime

…made aware of the consequences of their actions. Legislation must also encourage victims to come forward and explore avenues of legal remedy. Cybercrime offenses have a low conviction rate, which…

news

ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology

…that human-centered security is the way forward. The idea starts with a simple premise, and one backed up by empirical evidence; human beings tend to be the weak link in…

Leave a Comment on ISF Proposal for “Human-Centered Security” Focuses Security Awareness on People’s Interactions With Technology
podcast

A Sneak Peak into Season 32…

…most impactful moments to look forward to, featuring standout segments from upcoming episodes with guests including the former Head of Innovation and Creativity at Disney, and Research Lead at the…

podcast

The Power of Inclusive Leadership

…an independent oversight board for Meta and former Prime Minister of Denmark, explores how to balance online regulation and freedom, and shares insight into the crucial role of leadership in…

news

The most successful AI projects feature buy-in from top management

…inputs, and guide algorithms toward new targets. Leaders who stay connected with AI rollouts can help their teams change direction when needed. This ensures that AI projects respond to changing…

news

Eurasia Risks 2021 – Digital Totalitarianism

…of global players in the information technology market, “digital control” over the lives of citizens becomes total, actively invading the jurisdictions of nation states around the world. In 2021, the…

Leave a Comment on Eurasia Risks 2021 – Digital Totalitarianism
event

The Rise of the Cloud-Conscious Adversary

…is a key access point in the cloud Human error drives cloud risk   A versatile IT Professional of 18 years, Mark has excelled in network redesign, server migration and…

news

Augmented Attacks Expected to Distort Reality

…traditional entertainment and gaming markets into areas such as retail, manufacturing, engineering and healthcare. Attackers will perform man-in-the-middle attacks on AR-enabled devices and infrastructure, gaining access to intimate and sensitive…

Leave a Comment on Augmented Attacks Expected to Distort Reality
news

Why Organizations Should Be Wary of the Security Risks Posed by Augmented Reality

…with significant investment in the UK, US and Chinese markets. The estimated global market value for AR technologies is set to grow from $4 billion in 2017 to $60 billion…

Leave a Comment on Why Organizations Should Be Wary of the Security Risks Posed by Augmented Reality
news

Promoting A Culture Of Adaptability: 16 Effective Tips For Businesses

…shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where…

Leave a Comment on Promoting A Culture Of Adaptability: 16 Effective Tips For Businesses
event

CISO 360 Middle East

…CISO 360 Middle East: Opportunity to connect with CISOs and business leaders from the Middle East and beyond to learn, network, and benchmark effective leadership strategies Benefit from a unique…

Managing Cyber Threats During Periods of Instability

How could your organisation be affected during periods of instability, and what steps could you take to understand the potential threats and be better prepared? The Information Security Forum has…

news

Three Threats Dirty Data Poses to the Enterprise

…toward illicit data manipulation to compromise the accuracy and credibility of information, thus puncturing the integrity of the data organizations use to drive their businesses forward. 2. Misleading signals will…

news

New Year’s Resolutions for the Board in 2021

…new technologies, the geopolitical arena is likely to become complex, turbulent and fragile. More inward-facing policies will be a result of frustration with liberalism and globalism, while national and commercial…

Leave a Comment on New Year’s Resolutions for the Board in 2021
podcast

AI Futures: Assessing the danger

Having explored the staggering potential of AI in business, the focus now shifts to questioning whether its potential will be leveraged for beneficial or detrimental purposes. Rob MacGregor, a threat…

news

Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business

…sales and marketing, and support them in acquiring some of the security skills we seek? The truth is that it’s very difficult to train somebody in the softer, emotionally intelligent…

Leave a Comment on Technology Is Just A Tool: Why People Are The Heart Of Everything We Do In Business
news

The new reality of a world online

…expecting to see positive results. As life gradually returns to normal, what can businesses take forward from this period of upheaval? We must see this situation as an opportunity to…

Leave a Comment on The new reality of a world online
podcast

The Evolution of ISF Research: Insights into the future

In 2023, the ISF research team will focus on: exploring the future via scenarios, leadership, securing industrial control systems, and building a tool to help Members measure key information security…

podcast

Building Human Connection for Brand Success

…for, among others, Caesar’s Palace, Lego, Omega, Vera Bradley, and Yamaha. Bob shares his perspective on digital transformation in the retail market, building a solid team, and effective communication within…

podcast

How Copenhagen Is Tackling the Cyber Skills Shortage

The global cyber security profession is facing a universal challenge in attracting talented individuals. Lisa Hartmann-Jensen from the City of Copenhagen’s administrative office explores how leveraging local colleges is winning…

podcast

Getting Smart About Threats

Following the recent release of the updated ISF Threat Intelligence: React and prepare report to Members, ISF Analysts sat down to offer their unique experience and insight into the current…

podcast

Taking the Measure of Governance

Iwona Muchin from ISF Member Ageas joins the analysts behind the recent ISF Measuring Security and Nurturing Security Governance reports, to provide her unique perspective into what it takes to…

podcast

The Best of the ISF Podcast
2023… So Far

We hope you enjoyed tuning in to our Summer Listening programme over the last few weeks. As we enter Season 22, we thought we would take a moment to reflect…

news

The Future’s Biggest Cybercrime Threat May Already Be Here

…(ISF.org) finds a thriving marketplace on the Dark Web full of wannabe criminals. Products and services start as low as $300 simply to have an individual hacked. A young adult…

Leave a Comment on The Future’s Biggest Cybercrime Threat May Already Be Here
podcast

Scenarios for an Uncertain Future

In a world filled with unpredictability and chaos, relying on conventional methods will not prepare organisations for an uncertain future. Against this backdrop, Threat Horizon is changing. Listen as ISF…

news

Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development

…that the cybersecurity workforce needs to increase 62 percent in the U.S. market, ISC(2) said. Trouble Spots The fundamental causes for the skill gap are myriad, starting with a lack…

Leave a Comment on Cybersecurity Skills Gap Worsens, Fueled by Lack of Career Development
tool

Managing Information Risk the ISF Way

…Practice for Information Security 2020 (SOGP 2020), the ISF Benchmark, the ISF Information Risk Assessment Methodology 2 (IRAM2) and the ISF’s research programme. Identify. Assess. Protect Designed to be as…

news

The Agentic AI Dilemma: Great Power With Great Risk

…oversight. Their speed allows organizations to uncover strategic insights, spot emerging market changes, prevent fraud and predict maintenance needs. Scalability is another fundamental benefit. Once deployed, agentic AI agents can…

podcast

The Pragmatic Approach to Tackling Cybercrime

Rocio de la Cruz from BPE Solicitors provides a legal perspective on cybercrime and policy as ISF Analysts explore the ISF’s involvement in CC-Driver. The panel delve into the European…

news

FBI: COVID-19-Themed Business Email Compromise Scams Surge

“Criminals have become more sophisticated by considering the psychological aspects of an attack,” says Mark Chaplin, principal at the Information Security Forum. Fraudsters are taking advantage of the global COVID-19…

Leave a Comment on FBI: COVID-19-Themed Business Email Compromise Scams Surge

Gen Z – A New Threat to Information Security?

…of averages mean that there are high-level similarities between individuals banded together in these generations… Historically, marketers, branding experts and politicians have analysed the trends and preferences exhibited by individuals…

Leave a Comment on Gen Z – A New Threat to Information Security?

Cyber resilience: One side of the cyber risk management coin

…about it here. Mark Chaplin is an experienced information risk management professional with approximately 30 years of experience in the technology and information security industry. He specialises information security governance…

Leave a Comment on Cyber resilience: One side of the cyber risk management coin
news

Information Security Forum Releases Updated Guide to Security Best Practices

…from the ISF Benchmark and major external developments including new legislation and other requirements, The Standard is business-friendly and used by many global organizations as their primary reference for information…

Leave a Comment on Information Security Forum Releases Updated Guide to Security Best Practices
event

ISF Tools: A holistic approach to security

…management (IRAM2), control assessments (Benchmark), and managing supply chain risk (Supplier Security). This webinar will include: An introduction to each of the ISF Tools An overview of the new topics…

event

Building with Confidence: Security from Code to Cloud

…every stage of development. Comprehensive cloud security is no longer about shifting left. It’s about starting left–and going all the way to the right.   Join Ziad Ghalleb, Product Marketing…

Text Blocks

<Back to Blocks and Templates…

news

The Quantum Dilemma: Game-changer or game-ender

…same time) or entanglement (qubits become interlinked), enabling them to perform more complex calculations efficiently and simultaneously. Believe it or not, quantum computing is already here and its market is…

news

ISF Supports Cyber and Compliance Challenges with Launch of Aligned Tools Suite 2020

…and cross-reference aids, including a rebuilt Benchmark platform and the new IRAM2 WebApp. Aligned to the latest version of the Standard of Good Practice for Information Security 2020 (SOGP 2020),…

Leave a Comment on ISF Supports Cyber and Compliance Challenges with Launch of Aligned Tools Suite 2020
service

Security Assessment and Review

…and NIST as well as peer and industry sector groupings. Why work with ISF to run your Security Assessment and Review? Based on the unique ISF Benchmark, the ISF Security…

news

What CISOs need to know about Wi-Fi 6E

…market as manufacturers look to make money from this newer capability. Quotes from Paul Holland, ISF Principal Research Analyst In April 2020, the FCC voted to open 6 GHz for…

news

Four Major Cyber Risks in an Era of Tech Dominance

…of big tech companies. As these companies grow stronger through diverse revenue streams and enhanced investment power, they may create barriers to entry in the global digital marketplace that will…

news

Having Cash Flow Problems? 15 Areas To Investigate

…whose companies have a vision that shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting…

Leave a Comment on Having Cash Flow Problems? 15 Areas To Investigate
news

Organisations Cannot Prosper Without Trust: Five ways to boost trust with cyber security

…to the forefront, businesses are at an increased risk of losing both their revenue and reputation. According to Deloitte, a negative trust-related event can erode an enterprise’s market cap by…

news

5G Brings Benefits, But Also Heralds Fresh Security Threats

…their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role…

Leave a Comment on 5G Brings Benefits, But Also Heralds Fresh Security Threats
news

Six Skills CISOs Should Pursue To Elevate Their Role

…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….

Leave a Comment on Six Skills CISOs Should Pursue To Elevate Their Role
news

Cuts to Digital Security Spending Right Now Would Be a Big Mistake

…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….

Leave a Comment on Cuts to Digital Security Spending Right Now Would Be a Big Mistake
news

The Threat of Deepfakes and Their Security Implications

…example, a deepfake video of Ukrainian president Volodymyr Zelensky, urging Ukrainians to lay down arms was broadcast on Ukrainian TV. Stock markets A threat actor wants to make a quick…

news

US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency

…Act (DPA) would create a consumer watchdog to give Americans control and protection of their data, promote a competitive digital marketplace, and prepare the U.S. for the digital age. Introduced…

Leave a Comment on US Sen. Gillibrand Announces Legislation to Create a Data Protection Agency
news

What does the SEC indictment of SolarWinds mean for security leadership?

…liabilities are in sharp focus here, and if the CISO is to be personally liable going forward, what does this really mean for the role? Thirdly, what are the implications…

news

Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack

…users to download software as a precursor to being able to use one’s website or online services – even if it’s security software – introduce more risk than reward? “In…

Leave a Comment on Websites Requiring Security Software Downloads Opened Door to Supply Chain Attack
news

Federal Cybersecurity Directive Spotlights Aging Computer Systems

…protections needed to ward off the kinds of organized, sophisticated and widespread attacks that have crippled public- and private-sector systems in recent years. Defense Department, the Central Intelligence Agency and…

news

Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

…in that it is the only annual report that looks forward two years to predict the threat landscape whilst rigorously reviewing the past three years of predictions. In this way…

Leave a Comment on Information Security Forum: Nine Cybersecurity Threats Organizations can Expect Through 2022

Lessons from the CRO’s office

…team will bring the CISO significant reward when it comes to managing cyber risk. Here are five steps to get started. Engage with the CRO to understand approaches taken for…

Leave a Comment on Lessons from the CRO’s office
news

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

…procurement processes. Still, old systems will continue to pose problems. “We’re in a better place going forward than we ever were, but we’re having to deal with legacy,” he adds….

Leave a Comment on Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022
video

The Evolution of Cybercrime with Misha Glenny, Author of McMafia

…to merge, allowing global criminal networks to expand, and cybercrime becoming an increasing issue for law enforcement and politicians. In this interview, Misha Glenny, award-winning writer, broadcaster and author of…

news

Understanding the CFO’s Cybersecurity Role in the Age of COVID-19

…and it no longer provides the required protection, as many organizations have discovered. Going forward, organizations must extend risk management to include risk resilience, in order to manage, respond and…

Leave a Comment on Understanding the CFO’s Cybersecurity Role in the Age of COVID-19
news

Top Global Security Threats Organizations Will Face in 2021

…will enter the workplace, introducing new information security concerns to organizations. Their attitudes toward sharing information will fall short of the requirements for good information security. Reckless attitudes to sharing…

Leave a Comment on Top Global Security Threats Organizations Will Face in 2021
news

Security Trends Reshaping Enterprise Resilience Into 2027

…the horizon beyond this year and well into 2027. A forward-looking approach offers time for preparedness, prioritizing strategies that will help avert, mitigate (and hopefully eliminate) forthcoming threats that include…

news

COVID-19: Rethinking Cybersecurity in a Post-Pandemic World

…it must be protected and secured going forward. These are the types of conversations that CSOs and CISOs are having about the risks their organizations face in a permanent work-from-home…

Leave a Comment on COVID-19: Rethinking Cybersecurity in a Post-Pandemic World

Build a Security-First Culture to Defend Against Modern Cyber Threats

…champions secure behaviour from the top-down. This is your moment to lead with vision, empower your teams, and build a culture that not only protects, but propels your organisation forward.…

news

Threat Horizon 2023: Four Evolving Threats That Should Be On Your Radar

…in cybersecurity incidents. This trend has real implications for the way we manage both our people and our critical assets going forward. Working in a much more distributed and, therefore,…

Luka Ivezic

…and PwC, he has had a technology-forward approach from day one having been at various points in his career an expert and evangelist of 5G, OT, IoT, and AI cybersecurity….

news

Cybersecurity Budgets: Will They Survive COVID-19?

…these cuts will be temporary and that forward-thinking organizations know that security can’t be slashed at a time when adversaries are finding more and more ways into enterprise networks. If…

Leave a Comment on Cybersecurity Budgets: Will They Survive COVID-19?
event

Managing Operational Risk in a Downturn

…forward. About our speakers Steve Durbin, Chief Executive, ISF Steve Durbin is the Chief Executive of the Information Security Forum (ISF). His main areas of focus include strategy, information technology,…

Leave a Comment on Managing Operational Risk in a Downturn
news

Words of advice for President Biden’s new CISO

…to consider moving forward: Bring the federal government together. Think of the federal government as a patchwork quilt, it’s made up of lots of different fiefdoms. It’s quite a challenge…

Leave a Comment on Words of advice for President Biden’s new CISO

Quantitative Techniques in Information Risk Analysis

…that an amount of loss (usually financial) will be incurred. The most straightforward way to measure risk is to take an annual period, count the number of information security incidents…

Leave a Comment on Quantitative Techniques in Information Risk Analysis
podcast

The Human Side of Cybersecurity: Empathy, Risk, and Resilience

Maria Ross keynote Speaker and Award-winning journalist welcomes Steve Durbin at the Empathy Podcast for a compelling discussion on the intersection of empathy and leadership. Managers focus on tasks, leaders…

news

How To Develop A Human-Centered Security Program

…be reported to and where they should forward the message, they can just click that button right in the email and it will be investigated. The physical environment can also…

Leave a Comment on How To Develop A Human-Centered Security Program
news

Embracing vulnerability management for the greater good

…looks like – including any financial or other reward for confirmed vulnerabilities disclosed through the programme. There is no particular standard for defining your approach to RD or even how…

news

ISF: Your first line of defence

An interview with Steve Durbin, Chief Executive of the Information Security Forum (ISF) In response to evolving cyber threats, the Information Security Forum (ISF) offers award-winning consultancy services, training, certifications,…

news

Designing and Building a Security Architecture

…greatest reward. Determine Approach Armed with objectives, it’s time to drill down into the current state of your existing architecture and projects. Analyze and document the core characteristics and components….

news

EXPERT OPINION: If we fail to prepare, we prepare to fail

…to prepare for, and anticipate, future threats to their business operations such as the one observed recently. Complementing this are our award-winning consultancy services, available to Members and non-Members alike,…

news

Time to accept printers will leak data

…making the corporate network more like an Internet of Sieves. The humble printer is here to stay, and the magic of paper and the printed word should be reward enough….

podcast

Embedding a Culture of Innovation into Everyone’s DNA

The faster things change, the easier it is to get left behind struggling to find ways to take advantage of the opportunities this change exposes. Duncan Wardle, former Head of…

news

Security and the Business: It’s good to talk

…pressure to transform as quickly as possible. However, uncontrolled and rapid transformation can increase both business risk and potential reward. Security and business leaders have become disengaged at a critical…

podcast

Empowering Your Team: Lessons from a sports coach

…collective course. (3:50) 2. Staying vocal as a leader. (6:05) 3. Whether something goes to plan or not, an autopsy of the scenario can be a helpful way forward. (10:06)…

news

EU court kills Privacy Shield, wreaks havoc on digital economy

…brought in the wake of former CIA subcontractor Edward Snowden’s revelations that the NSA was running a covert program that spied and collected data on U.S. citizens. In today’s decision,…

Leave a Comment on EU court kills Privacy Shield, wreaks havoc on digital economy
service

Strategic Threat Analysis

How forward-looking is your cyber security strategy? ISF’s Strategic Threat Analysis is a short-turnaround, high-impact engagement to review and sharpen your cyber security roadmap and create a board-ready outcome to…

news

How Organisations Can Prepare For Attacks On Critical Infrastructure

…offer a way forward when comprising a shortlist of best practices organizations can follow to thwart initial access and limit threat exposure. 1. Change default passwords. Many critical infrastructure assets…

podcast

Why Women Stay in Cyber

…resources that have supported them on their journey, and the industry advancements they are most looking forward to seeing play out in the future.   ​​​​​​…I think Mentorship is hugely…

event

North American Threat Horizon Workshop Series: ISF Predicts 2023 – Building Resiliency

…a list of suggested actions to aid you in formulating a forward-looking cyber resilience strategy. The event will be run under the Chatham House rules. Meet our sponsor OpenText is…

news

Five Strategies For Boards To Enhance Governance And Resilience In The Face Of Evolving Cyber Risks

…of technology as a means to drive their business forward without debating or discussing the “what happens when it goes wrong” question. Ransomware attacks on hospitals can result in delayed…

news

Five Top Qualities You Need to Become a Next-Gen CISO

…These are questions CISOs must help answer. Risk is a business decision and not a security decision — while it’s the CISO that initiates the risk and reward discussion, it’s…

news

Navigating Divisions In The Workplace: The impact of social media and rise of individual ideologies

…a tendency to share items when they are outlandish and sensational. Misinformation spreads quickly, producing a fragmented world—a noticeable shift away from collective nationalism and toward favoring a range of…

news

Six core characteristics that next-generation CISO’s exhibit

…of the next-generation CISO, however, they stand out as key differentiators of forward-looking professionals. The six differentiating characteristics include: Balancing Opportunity with Risk Demonstrating Leadership Managing Incidents and Crises Finding…

Leave a Comment on Six core characteristics that next-generation CISO’s exhibit
news

How Criminals Use Artificial Intelligence To Fuel Cyber Attacks

…benefit. As companies look to reduce costs, AI is fast becoming more attractive as a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking…

Leave a Comment on How Criminals Use Artificial Intelligence To Fuel Cyber Attacks
news

EXPERT OPINION: Social Engineering Attacks: Understanding OSINT to mitigate risk

…According to ISACA’s 2022 State of Cybersecurity Report, social engineering is the predominant cyberattack method accounting for 13% of incidents; the trajectory is upward.[4] Additionally, social engineering attacks are growing…

Our Services

…expertise. In response to this, the ISF provides award-winning consultancy services, training and certifications and professional support activities that supplement the implementation of ISF research and tools, to all Member…

news

The New Security Leader: Less Techy, More Business-Savvy

…entry for security leaders,” he said. “There are CISOs coming into the industry and into these leadership roles without a massive technical background.” Watts foresees a shift toward decentralized security…

podcast

Reputation in the Digital Age: Protecting Your Online Identity

Catherine Bosley, an award-winning veteran journalist, with more than thirty years of public speaking experience, joins Steve Durbin to discuss the importance of protecting one’s online image, what to do…

news

Georgia Election Data Hit in Ransomware Attack

…Forum. “Moving forward, end users should receive ample security awareness, education and training on the threat of ransomware, particularly its delivery mechanism,” Norman said in an emailed statement. “Typically, the…

Leave a Comment on Georgia Election Data Hit in Ransomware Attack
event

What is your SASE architecture missing?

…Service Architecture (SASE) as the only way forward. It’s likely that you’ve already implemented components and principles of this new architecture into your environment, and your security strategy is more…

Leave a Comment on What is your SASE architecture missing?
news

Security Think Tank: Bug bounties are changing the image of hackers

…it takes, which is what happens with conventional penetration testing. This encourages the hackers to delve deep and discover something – the more critical the vulnerability, the bigger the reward.…

Leave a Comment on Security Think Tank: Bug bounties are changing the image of hackers
news

Remote Work in 2021: Cybersecurity Grows in Importance

…Dice. “It has accelerated and concentrated forces, such as the move to remote working and adoption of cloud services, that were already in motion. Moving forward in 2021, organizations must…

Leave a Comment on Remote Work in 2021: Cybersecurity Grows in Importance
podcast

Leadership Empathy and the Cultural Balance Sheet

…not about the reward. It’s about the recognition…babies cry for it and grown men die for it. That’s what recognition is… Tune in to hear Steve and Christy talk about:…

news

How criminals use artificial intelligence to fuel cyber-attacks

…a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking companies must plan to mitigate the potential risks now.   Steve Durbin, ISF CEO…

news

Technology Addiction: The Hidden Cybersecurity Threat

…supported rather than monitored and controlled, they’re more likely to embrace healthier work habits voluntarily. The Path Forward The Massachusetts school cellphone ban recognizes that digital addiction has become a…

news

Covid-19 Spurs Facial Recognition Tracking, Privacy Fears

The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn. In the midst of the ongoing…

Leave a Comment on Covid-19 Spurs Facial Recognition Tracking, Privacy Fears
podcast

Communication: Listen and be heard

…first woman to be promoted to this position in over three centuries of the company’s history. She is known for leading the global insurance and reinsurance market for five years,…

Leave a Comment on Communication: Listen and be heard

Francesca Williamson

…also managed the Benchmark platform, a controls assessment tool that helps organisations demonstrate compliance with multiple industry standards and frameworks, contextualise performance against regional and industry scores, as well as…

Leave a Comment on Francesca Williamson
news

Impact of Coronavirus Outbreak on Early Stage Venture Investment in Cybersecurity

…ethically-based, digital play on the use of data to deliver quantifiable and immediate value to CISOs of all size companies. This will include both internally focused and market driven data.”…

Leave a Comment on Impact of Coronavirus Outbreak on Early Stage Venture Investment in Cybersecurity
news

The Short-Term Impact of #COVID19 on the Cybersecurity Industry

…of data. Is there a negative outlook for businesses in the cybersecurity industry, despite the optimism of market predictions? Steve Durbin, managing director of the Information Security Forum disagreed, saying…

Leave a Comment on The Short-Term Impact of #COVID19 on the Cybersecurity Industry
news

The Long-Term Impact of #COVID19 on the Cybersecurity Industry

…this clearly presents a challenge for a new entrant. “That being said, those that are able to sufficiently differentiate themselves through smart marketing interactions that demonstrate value to the target…

Leave a Comment on The Long-Term Impact of #COVID19 on the Cybersecurity Industry

Jean-Michel Chapon

…Director at investment bank, LD&A, now Drake Star, and Associate Director at Gartner, in the Market and Business Strategy practice for the vendor community. Jean-Michel developed a taste for security,…

event

The Future CISO: Securing the digital organisation of the future

…sixteen years as a security executive and CISO in several industry sectors including financial services, retail, critical national infrastructure, food and beverage, data analytics and market research. A certified information…

news

The Impact of Coronavirus on the Threat Landscape

…unprepared workforce. At the same time, natural forces will wreak havoc on infrastructure. Invasive technologies will be embraced across both industry and consumer markets, creating an increasingly tumultuous and unpredictable…

Leave a Comment on The Impact of Coronavirus on the Threat Landscape
news

Practical tips and advice for personal IoT security

…outset. However, with a significant number of IoT devices already in circulation, connected and on the market, users have a real responsibility to proactively protect their devices and the information…

Leave a Comment on Practical tips and advice for personal IoT security
news

Giant Group cyber attack prompts renewed calls for statutory regulation of umbrella companies

…that the Giant Group attack may lead some other umbrella company firms to reassess their own security posture, contracting market stakeholders hope the incident might prompt the UK government to…

news

The 6 Elements Defining a Valid Cybersecurity Strategy

…security strategy is one that seriously considers the organization’s unique challenges, risks and resources, including its support for the overall business strategy—such as expanding to new markets, introducing new products…

news

Robo-helpers will soon help themselves to data

…an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach…

Leave a Comment on Robo-helpers will soon help themselves to data

What Assurance Should Boards be Obtaining from their CIO and CISO?

…and marketing legal, regulatory and contractual compliance. Emphasise the importance of representing all aspects of the organisation Agree on areas of the business for which they require specific or increased…

Leave a Comment on What Assurance Should Boards be Obtaining from their CIO and CISO?

Nordics

Nordic countries boast some of the strongest cyber security defences in the world. Yet their location makes them a prime target for threat actors. Our Members across Sweden, Denmark and…

news

The internet of forgotten things will bite back

…for IoT devices made and used across the US and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately…

Leave a Comment on The internet of forgotten things will bite back
news

10 Benefits of Running Cybersecurity Exercises

…of respondents to the ISF Benchmark stated that they do not subject critical systems under development to cyber attack simulations or exercises. This may be because cybersecurity exercises are perceived…

Leave a Comment on 10 Benefits of Running Cybersecurity Exercises

Threat Horizon – The World in 2022

…significant impact on not only domestic but also global economic practices. Markets will have a reactionary response to the volatility and uncertainty driven by protectionist policies and practices. The weaponisation…

Leave a Comment on Threat Horizon – The World in 2022
news

Behavioral Analytics Expected to Trigger a Consumer Backlash

…consent, with attackers targeting and compromising poorly secured systems and databases at will. Impacts will be felt across industries such as retail, gaming, marketing, and insurance that are already dependent…

Leave a Comment on Behavioral Analytics Expected to Trigger a Consumer Backlash
news

Cybersecurity Must Be the Top Priority for the Board in 2021

…systems and technologies, both existing and new, a key focus. This must then filter down from the top into day-to-day business functions such as Human Resources (HR) and marketing. Not…

Leave a Comment on Cybersecurity Must Be the Top Priority for the Board in 2021

Scott Binning

Scott previously completed a summer internship at the ISF with the Research and Marketing teams and rejoined the ISF full time following the conclusion of his degree studies at Loughborough…

news

Open Source Security Issues Exist: Deal With Them, Report Urges

…increase speed to market for new ideas, he explained. OSS is often seen as being insecure and unsupported. As these negative connotations continue to taint its reputation, some organizations officially…

Leave a Comment on Open Source Security Issues Exist: Deal With Them, Report Urges
news

Four Cyber Risk Trends to Watch in 2023 and How Businesses Can Mitigate Them

…It’s about adapting security around the macro cyber security environment and where the markets are taking us from an economic and trade standpoint. How can organisations tackle these cyber security…

Threat Horizon 2022: Neglected infrastructure cripples operations

…for near-instantaneous connectivity and reduced latency will invigorate to edge computing technologies, architectures and solutions. The desire for edge computing could see its market value grow to $28 billion by…

Leave a Comment on Threat Horizon 2022: Neglected infrastructure cripples operations
news

Six Ways A Good Leader Can Become A Great Leader

…great leader: Always try to improve. A hunger to further your knowledge and understand everything in your business is the hallmark of a good leader. Strive to listen when there’s…

Leave a Comment on Six Ways A Good Leader Can Become A Great Leader
event

Ways to survive the ransomware menace

…the board, security practitioners, vendors and authorities will play in helping enterprise prepare, respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF |…

news

Three Steps to Securing Supply Chains Under Pressure

…rapidly identify and build new routes, form fresh partnerships, and ensure a steady flow of product in the face of major fluctuations in demand. While some markets have dwindled with…

Leave a Comment on Three Steps to Securing Supply Chains Under Pressure

Cookies Policy

…for marketing purposes. Personal data we collect via cookies Cookies capture your computer’s unique online electronic identifier; this is known as an IP address. Your IP address is considered to…

Accessibility Statement

The Information Security Forum is committed to ensuring digital accessibility for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards. Measures…

How to quantify assets?

…can be valued according to one of the three following approaches: the future revenue that could be generated from it, the value similar data has in an active market and…

Leave a Comment on How to quantify assets?

How to establish a behavioural baseline

…benchmark before investing in a programme, then they fail to understand why they cannot demonstrate a return on investment or the impact the programme is having on behaviour. For example,…

Leave a Comment on How to establish a behavioural baseline
event

Good AI Gone Bad – A Zero Trust Story

…He is Director of Systems Engineering where he is responsible for overseeing the EMEA go-to-market systems engineering team. Michael is an accomplished public speaker, regularly speaking at conferences and webinars….

Four key steps to transform security awareness, training and education

…improved by using marketing techniques that have been well established over the years. The security team can use visual and audio content such as jingles, slogans, phrases and music to…

Leave a Comment on Four key steps to transform security awareness, training and education
event

9th CISO 360 Global Congress 2025

The ISF is a proud supporting partner of the 9th CISO 360 Global Congress 2025. Join CISOs from around the world as they share strategies, explore emerging trends, and benchmark…

news

Zero Trust: Five Misconceptions Every Business Should Avoid

…can automatically transform the buyer into a zero-trust organization. Even though there are several products on the market that certainly claim to do so, no single product in isolation can…

podcast

The Best of the ISF Podcast
2022… So Far

…conversation with: David Thornewill – Group CISO at DHL Marc Gibson – Owner and CEO of DThree Technologies Alexander Seger – Head of Cybercrime at the Council of Europe Mark…

event

Australasia Chapter Spring Meeting 2025

Mark your calendars for the Australasia Chapter Spring Meeting on Tuesday, September 9, 2025. This event provides ISF Members with a unique opportunity to engage with security professionals from the…

news

Agentic AI: The Promise and Peril of Autonomous Intelligence

…labor market, extend social inequalities and redefine settled assumptions regarding privacy and consent. If not controlled in advance, trust can erode between business partners or encourage a public backlash against…

Terms of use – ISF Live

…check them for changes because they are binding on you. Trademark ISF and Information Security Forum are UK Registered trademarks Applicable law The English courts have the only right to…

event

The Superpower of AI: Unleashing mis- and disinformation at horrific scale

…in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA at KnowBe4, he helps organisations of all sizes understand why more emphasis is…

Cookie Notice – ISF Live

…for marketing purposes. Personal data we collect via cookies Cookies capture your computer’s unique online electronic identifier; this is known as an IP address. Your IP address is considered to…

news

World’s Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk

This landmark study provides private- and public-sector leaders with evidence-based insights into the cybersecurity practices and investments that are most effective for mitigating risks. ThoughtLab, a leading global research firm,…

news

Three Unintended Consequences of Well-Intentioned Cyber Regulations

…successfully walk this tightrope will not only have a clear competitive advantage but also propel themselves to be on a path to becoming market-leading enterprises. Read the full article here…

event

India Chapter Autumn Meeting 2025

Mark your calendars for the India Chapter Autumn Meeting on Friday, September 12, 2025. This English-language event provides ISF Members with a unique opportunity to engage with security professionals from…

event

Keeping Pace with Cybersecurity by Scaling IT Governance and Data Risk Management

…to reinforcing and measuring your InfoSec risk program. In this session, Jorge highlights some of the latest market insights from InfoSec leaders, peers, and industry analysts, examining the driving factors…

event

Building an Enterprise Data Strategy for the Modern SOC

…Director – Technical Marketing of NG-SIEM & XDR at CrowdStrike, will share and explore: Mid-year review of 2024 IT and Security key trends and predictions The evolution of the SOC…

podcast

Emerging Threats for 2024

As 2023 draws to a close and 2024 looms ahead, we find ourselves grappling with a landscape marked by economic recession, societal unrest, and intensifying geopolitical strife. In the face…

news

The Trouble With Automated Cybersecurity Defenses

…Unrealistic expectations and complacency can lead to disaster. Lack of Understanding Automated cybersecurity is a competitive space. The SOAR market is growing fast and expected to reach $1.3 billion by…

event

InfoSecurity Europe 2025

…test and benchmark solutions, build relationships, drive new business and connect with professionals alike. Why should you join? Gain insights from over 250 leading experts on how to tackle today’s…

news

Infosecurity Europe: Cyber Security Industry Still Fighting to Recruit and Retain Talent

…labor market push up wages. This was the view of a panel of chief information security officers, speaking at Infosecurity Europe. But there are steps that organizations can take to…

event

Demystifying the Dark Web

…about the origins of and motivations behind cyber crime perpetuated in deep and dark web (DDW) forums and marketplaces. Gain an understanding of the demands to which DDW actors are…

podcast

Remodelling the Architecture Behind Trust

…their thoughts and ideas, turned out to be great insight that allowed me to then put together a plan…because they knew the market best, of things that could be different……

video

Ways to survive the ransomware menace

…respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF | James Tamblin, UK President, BlueVoyant | Steven Moran, Head of Information Security Governance,…

news

Deepfakes will tell true lies

…markets, promote political agendas or gain competitive advantage. Severe reputational damage will be caused when executives or high-profile individuals have their identities compromised. Organizations and individuals will face a new…

Leave a Comment on Deepfakes will tell true lies
news

Artificial Intelligence: The Future Of Cybersecurity?

…Businesses are pouring billions of dollars in AI and automation, and the Industrial IoT (IIoT) alone is set to become a $500 billion market by 2025. IT/OT convergence could spell…

news

On the Cybersecurity Horizon: Digital and Physical Worlds Set to Collide

…from the digital world have an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The…

Leave a Comment on On the Cybersecurity Horizon: Digital and Physical Worlds Set to Collide
event

Cyber Security Ratings Are a Thing, What Do I Do Now?

…security posture is sufficient to prevent cyber attacks and ensure information security. Watch as SecurityScorecard’s Josh Fazio, Sr. Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, dive into…

video

3 Key Takeaways from Today’s cybercrime pandemic and what to do about it

Hear 3 key takeaways from Today’s cybercrime pandemic and what to do about it – CxO Roundtable. Understand what organisations can do to prevent themselves from attacks, how CISOs can…

event

A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk

…six years at Manhattan Associate’s as a Design Lead where he collaborated with customers and R&D directors to identify market trends and opportunities for efficiency gains within clients distribution centers…

news

The Internet Of Forgotten Things Will Leave A Dangerous Legacy

…and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately managed, it will fast become a major security concern…

Leave a Comment on The Internet Of Forgotten Things Will Leave A Dangerous Legacy
video

Colonial Power – Todays Cybercrime Pandemic and what to do about it

Panelists from the ISF CxO Roundtable – Today’s Cybercrime pandemic and what to do about it discuss the recent colonial pipeline, the negative impact of OT, and the decision of…

event

Cyber Security Summit Hong Kong 2024

…aim to provide participants with the latest information on security trends and developments. Mark your calendar now for the upcoming Summit, scheduled to take place on 23-24 October 2024.  …

news

How Cybersecurity Leaders Can Add Value to M&A Deals

…consequences could dramatically reduce the share price, erode market value and expose the business to a number of class action suits or federal and regulatory investigations. How can information security…

event

ISF Annual Threat Update: Emerging threats for 2025

As we close out 2024, a year marked by unprecedented change and disruption across the world, the question arises: are we set to see more disruption in 2025? With increasing…

event

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

Watch this insightful webinar with James Hickey, Senior Product Marketing Manager at Cofense, to learn why relying solely on technology for email security can leave your organisation vulnerable. Despite the…

event

Living Off the Cloud: How to move faster than attackers with CDR

…environments, and access critical assets more effectively than ever. In this session, Lauren Place, Product Marketing at Wiz, will present a real-world case study of a “living off the cloud”…

news

Why the Cybersecurity Skills Gap Continues to Widen

…security workforce, organizations should adapt to market demands by seeking candidates with diverse competencies and skill sets coupled with providing competitive benefits and structured career development. For some these changes…

Leave a Comment on Why the Cybersecurity Skills Gap Continues to Widen
news

Threats from the digital world lead to greater cyber security concerns

…both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach to security and resilience will be crucial as a hybrid threat…

Leave a Comment on Threats from the digital world lead to greater cyber security concerns
event

Lessons From the Frontline: What we learn from Cyber Simulation Exercises

…Mark Chaplin, ISF Principal, will provide insights from many of Cyber Simulation Exercises he and his team run for leading organisations in the ISF Membership. You will learn about best…

event

Security Middle East Conference 2025

…knowledge and connect with industry leaders at this must-attend event. Why attend this event? Network with key decision-makers and position yourself at the forefront of the booming Saudi Security market….

podcast

Threat Horizon 2027:
Grasping for Control

In a rapidly evolving world marked by disruption, the ISF Threat Horizon 2027 acts as a guide for security and business leaders to navigate an uncertain future, offering a two-year…

news

Technology Governance Needs a Rethink on Prioritising Resilience Against Digital Threats

…in product features, new markets, or improving the customer experience. When organizations look to trim costs, security is too often the target. That’s because security does not easily lend itself…

news

Walking the Tightrope: Navigating the risks and rewards of AI

When technologies and markets are still in their infancy, it is difficult to predict how they will evolve and what the implications might be. The recent fundamental shift in AI…

news

Security Think Tank: To stop ransomware, preparation is the best medicine

…detection and response (EDR) marketplace – there are some amazing products out there. And if you aren’t rocking a security operations centre (SOC), I recommend a managed solution (MDR) if…

event

Security Culture: Making cybersecurity an active part of your organization

…years of experience in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA for KnowBe4, he helps organizations of all sizes understand why…

event

Australasia Chapter Winter Meeting 2025

Mark your calendars for the Australasia Chapter Winter Meeting on Wednesday, May 28, 2025. This English-language event provides ISF Members with a unique opportunity to engage with security professionals from…

event

Shielding the Future: Europe’s cyber threat landscape report

Based on our interviews with more than 4,000 cybersecurity professionals from 13 markets across Europe, our report includes new findings on security preparedness and outcomes, revealing how organizations are coping…

news

How to Enhance Security Education, Training and Awareness for Employees

…contextualized to specific role requirements. For example, a senior executive will not experience the same threats as a marketing manager, so why should they both have to complete the same…

Leave a Comment on How to Enhance Security Education, Training and Awareness for Employees
podcast

Threat Horizon 2025 – The Future of Work: Location and technology collide

…transformations within organisations must be carefully planned, especially if the organisation is competing in the highly innovative markets. Whilst there are big opportunities with such a gamble, there are big…

news

Understanding And Responding To Ransomware Threats

…rarely get their data back in full. It’s not that these companies don’t receive the decryption keys after paying because, after all, ransomware groups need to sustain their market reputation…

event

Francophone Chapter Autumn Meeting 2025

Mark your calendars for the Francophone Chapter Autumn Meeting on Monday, September 22, 2025. This English and French-language event provides ISF Members with a unique opportunity to engage with security…

event

India Conference 2025

Mark your calendars for the India Conference on Friday, June 20, 2025. This English-language event provides ISF Members with a unique opportunity to engage with security professionals from India and…

event

Protecting the Crown Jewels: Securing what matters most

What would happen if your organisation’s most valuable information was compromised? In today’s digital market, valuable, accurate information can be the difference between success and failure. Mission-critical information assets, also…

event

The Influence of AI in Supply Chains

…THE SPEAKER Francesca is an analyst in the tools and methodologies team, and is the product owner for the Benchmark and the Supplier Security tool, which are the ISF’s security…

news

Why ransomware has become such a huge problem for businesses

…products. “The market for ‘ransomware-as-a-service’ has boomed over the last few years,” Norman told TechRepublic. “Anyone with access to the Dark Web can buy readily available ransomware kits for less…

Leave a Comment on Why ransomware has become such a huge problem for businesses
news

Measuring Cyber Security: The what, why and how

…and KRIs help answer and this is why practitioners must be laser-focused on KPIs and KRIs to benchmark their security performance, preparedness, and effectiveness. How can security teams measure cyber…

event

Canada Chapter Fall Meeting 2025

Mark your calendars for the Canada Chapter Fall Meeting on Thursday, September 25, 2025. This event provides ISF Members with a unique opportunity to engage with security professionals from the…

news

From Cartels to Crypto: Trends Show Disruptive Cybercrime Evolving Rapidly

…influential trends that mark this evolution. A Lot More Nation-State Activity To gain a tactical advantage over their opponents, almost every country has historically engaged in some form of intelligence…

news

The Human Advantage in the Age of Technological Uncertainties

…making human progress. For now, global marketplaces and ecosystems are fragmented regarding AI, with various regions having non-cohesive regulations on AI governance. This becomes very challenging from a business operations…

news

Mastering Control In The Era Of AI And Transformative Change

…control and moving toward building system and cultural resilience, adaptability and strategic alliances. Leadership: Blending Cyber With Business Strategy Cybersecurity executives need to move beyond technical management to strategic facilitators,…

Terms of Use

…10. Variation We change these terms from time to time and you must check them for changes because they are binding on you. 11. Trademark ISF and Information Security Forum,…

podcast

How EU Legislation is Supporting Secure Innovation in Security

…borders in our market – goods move freely, people move freely, money moves freely. Well, that means our systems are interconnected…if you have one country that is the weak link,…

event

EU Cybersecurity Regulations: What’s changing and how ISF can help

…and overlapping control expectations for organisations operating in or engaging with the European market. In this webinar, Benoit Heynderickx and Luka Ivezic provided a clear update on these major EU…

news

Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt

…welcome, there are nevertheless caveats. The cybersecurity workforce is a huge and diverse market, and the in-demand skill set is constantly changing. We don’t know where the 700,000 additional staff…

Leave a Comment on Cybersecurity Workforce Study Needs to be Taken with a Pinch of Salt
podcast

Leadership – Growing Good to Great

…can support their teams throughout this unprecedented period of change; the difference between good leadership and great leadership; and more. This episode marks the beginning of our podcast’s fifth year…

Leave a Comment on Leadership – Growing Good to Great

Alex Jordan

Alex works across the ISF Tools portfolio to ensure that deliverables provide maximum value to Members. He has previously led the ISF’s software development activities for the ISF Benchmark, was…

Leave a Comment on Alex Jordan
news

Use the human-centered approach for smarter security and compliance teams

…and tools overload the market, potential employees have come to recognize information security and compliance as deeply technical, leaving recruiters struggling to identify and appeal to candidates with a less…

Leave a Comment on Use the human-centered approach for smarter security and compliance teams
news

Five Key Elements To Consider Before Designing A Cyber Exercise

…needs to be managed differently than the rest. In some scenarios, customers have to be contacted before an organization goes to market and talks to media. Whether the organization has…

news

ISF Coronavirus (COVID-19) Update

…the 2020 Information Security Standard of Good Practice, to be shortly followed by our new Benchmark. We have also started research on Supply Chain Continuous Assurance, Addressing Extinction Level Events…

Leave a Comment on ISF Coronavirus (COVID-19) Update
ISF Information Security Forum
Podcast Youtube Linkedin
  • About Us
  • In the news
  • Our Members
  • Sponsorship
  • ISF Annual Report 2024
  • Meet the ISF Experts
  • Terms of Use
  • Privacy Policy
  • Trust Centre
  • Code of Conduct Statement
  • Cookies Policy
  • Accessibility Statement
© Information Security Forum Ltd 2025 . All rights reserved.