Mark Ward
Mark has also provided guidance on the emergence of next-generation CISOs and is currently investigating how to make information security governance more engaged and effective. Before joining the ISF, Mark…
Mark has also provided guidance on the emergence of next-generation CISOs and is currently investigating how to make information security governance more engaged and effective. Before joining the ISF, Mark…
All infosec teams have been under huge pressure lately and good CISOs acknowledge that and look for ways to help staff handle the stress Mark Ward, Senior Research Analyst at…
…Mark Ward, Senior Research Analyst at the ISF The coronavirus pandemic has seen a dramatic increase in cyber crime. Research from cybersecurity firm Checkpoint shows there were an estimated 200,000…
Mark is an accomplished risk management professional with more than 30 years of experience in multiple disciplines, including risk governance and assurance, business resilience, security standards and oversight, compliance management,…
…Year in Information Technology 2018/19 award. Votes were cast by approximately 89,000 online subscribers. Durbin is a global business leader, a Chartered Marketer and a Fellow of the Chartered Institute…
…Year in Information Technology 2018/19 award. Votes were cast by approximately 89,000 online subscribers. Durbin is a global business leader, a Chartered Marketer and a Fellow of the Chartered Institute…
A strategic tool that security teams across the globe are using to improve cyber security. By assessing security performance across a range of different environments, the ISF Benchmark enables organisations…
Information security professionals are facing increasingly complex threats—some new, others familiar but evolving. By 2021, the world will be significantly digitised and connected. Competing in the digital marketplace will become…
…Paul Watts and Mark Ward talk about their favourite books on cyber security principles, data privacy and cross-cultural management. … Unfortunately, a lot of that data is easily hackable, and…
…actors. This panel session features ISF Analyst, Mark Ward in conversation with: Peter West – Assistant Head Defensive Cyber Organisation at UK Ministry of Defence, with 20 years’ experience across…
ISF Principals Bharat Thakrar and Mark Chaplin join Mark Ward to begin a series dedicated to shedding light on a career in information security. The conversation covers their personal paths…
https://www.youtube.com/watch?v=Us0exCM1jg0 Following a turbulent two years, former-CISO and Distinguished Analyst at the ISF, Paul Watts, and Mark Ward, Senior Research Analyst at the ISF, are considering key recommendations for…
ISF Senior Analysts Mark Ward and Emma Bickerstaffe in conversation with Simon Meech, Cyber Practice Lead at insurance broker BMS Group. The incessant onslaught of ransomware attacks presents challenges for…
Our next Denmark Chapter Spring Meeting will be held on Thursday 14 March 2024. These meetings provide ISF Members with the unique opportunity to engage with local security professionals and…
Amanda Hallett and Karan Randhawa from Maersk offer industry insight into how they use the Threat Horizon report in their internal threat monitoring systems – providing great context to the…
When boards and CISOs engage successfully, organisations are better able to take advantage of the opportunities presented by cyberspace and today’s information technology while addressing the associated risk. The full…
Whilst AI models have circulated academic settings for years, their recent surge in popularity have ignited a crucial discussion about their future. Listen as Ellie Pavlick, professor at Brown University…
…the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he…
…economies such as Kenya, India, Brazil and Indonesia also called out as markets of interest to the UK. As the UK chases a Brexit dividend to open up non-EU markets…
…Kapil Raina, a cybersecurity marketing executive of 20+ years, has built and led product, marketing, sales, and strategy teams at startups and large brands such as VeriSign, VMware, and Zscaler….
Do your security controls measure up? Gain a comprehensive view of how ISF can support you in reviewing performance against your industry peers and industry frameworks with this four minute…
ISF Analysts Paul Watts, Max Brook, Lee Munson and Mark Ward further expand upon the latest ISF Threat Intelligence: React and prepare report to talk everything ‘threats’. The panel break…
…the organisational context such as artists and creators? Musician, performer and broadcaster LJ Rich explores the promise and peril of AI tech tools alongside ISF analysts Paul Watts and Mark…
…to Mark Ward and Paul Watts, how he developed an epic tale of King Infosecios and his three daughters Peoplia, Processia and Technia, to illustrate the concept of people, processes,…
Experience an exclusive session from the ISF World Congress in Rotterdam where Mark Ward assembled an accomplished panel of experts to dissect the past, present and future role of the…
…plugged. Raj Samani, Chief Scientist at Rapid7 joins ISF Analysts Lee Munson and Mark Ward to debate the best way security leaders and their teams can prioritise patching. What…
…the rise of the next-generation CISO, a security professional who is adapting to the new environment, mastering new skills and advancing the discipline of information security. Written by Mark Ward,…
…Brook and Mark Ward to explain the power scenarios have in helping security practitioners see beyond present problems and plot a path to a future that benefits everyone in the…
…older cohort. ISF researchers and analysts Arunoshi Singh, Scott Binning and Ayesha Sayyad educate Mark Ward on living with social media. Detailing the digital detox and the connections they maintain…
…better job rather than expose them, and their employer, to unknown or unforeseen risks. Mark Ward is a Senior Research Analyst at the ISF and has written papers on future…
…of Threat Horizon. Listen as ISF Analysts Max Brook, Richard Absalom and Mark Ward debate how the uncertainties and changes born from these trends will shape the near future. …I…
Perhaps the biggest change that CISOs need to accept is that hybrid working is how it will be from now on. There’s no going back. Mark Ward, ISF Senior Analyst…
Director of Cyber Security Governance at Danone, Lies Alderlieste, joins ISF Analysts Mark Ward and Paul Watts to provide counsel for security leaders embarking on a governance journey. Lies and…
Security practitioners and business leaders often seem like a community divided by a common language. Former historian Jemina Lakka-Kolari joins ISF analysts Paul Watts and Mark Ward to explore the…
…job entails at beginner, intermediate and expert levels. ISF Principal Bharat Thakrar and Analyst Mark Ward put the questions to the trio in this second of a series exploring infosec…
…– Patricia Rodrigues alongside ISF analysts Paul Watts and Mark Ward talks about how she uses it and debates what its ultimate impact will be. It’s a tool, it doesn’t…
Expanding upon many of the themes addressed in his book ‘Rethinking InfoSec’, Greg van der Gaast, CISO at Scoutbee, joins ISF Senior Analyst, Mark Ward, for another instalment of the…
ISF Analysts Paul Watts and Mark Ward expand upon the fallout of the pandemic on cyber with Monica Verma, CISO at the Norwegian Directorate of Health. Monica and the panel…
This Analyst Insight podcast sees ISF Analysts Max Brook, Mark Ward and Paul Watts discuss the background to this year’s Threat Horizon 2024: The disintegration of trust report. The first…
ISF Analysts Mark Ward, Paul Watts and Richard Absalom highlight the four key themes underpinning the recent release of Threat Horizon 2024: The disintegration of trust. The second in a…
This Analyst Insight podcast sees ISF Analysts Richard Absalom, Mark Ward and Max Brook continue breaking down this year’s Threat Horizon 2024: The disintegration of trust report released to Members…
ISF Analysts and authors of the latest Threat Horizon 2024: The disintegration of trust report, Mark Ward and Max Brook, speak with James Chappell from security firm, Digital Shadows, to…
…talk to ISF analysts Paul Watts and Mark Ward about the lessons he learned and how he applies them. “ … the academic route into our industry is not the…
…Max Brook and Mark Ward are joined by AI expert David Sully from Advai to explore how the use of AI is likely to shape the future of our professional…
Looking ahead to 2024, the ISF research team sit down to reveal what themes they will be looking into over the next 12 months. Listen as Mark Ward, Richard Absalom,…
…studying computer science. Providing his first-hand perspective is Benoît de Lavignère, one of the program’s first successful recruits. The conversation culminates with insightful questions from Richard Absalom and Mark Ward…
…cope are debated by Paul Watts, Richard Absalom and Mark Ward in this threat-themed podcast. Paul shares his formative experiences from the last big crisis he weathered – the 2008…
…Paul Ducklin, security podcaster Alice Violet and ISF analysts Lee Munson and Mark Ward debate if anything has changed or we are stuck in the same cycle of risks and…
…Highways, and cyber security veteran, delves into the many ways to hire and oversee InfoSec professionals alongside Distinguished Analyst Paul Watts and Senior Analyst, Mark Ward from the ISF. …We…
…being a CISO? Security leader Erhan Temurkan joins ISF analysts Paul Watts and Mark Ward to dissect his journey from BISO to CISO and unpack what he saw along the…
…Burns-Peake and experienced former CISO Paul Watts, engage in a discussion on strategies for establishing a favorable early reputation and fostering constructive relationships rather than risking alienation. Mark Ward serves…
…do with the marketing of a product, which is driven by suppliers competing against their market rivals in a saturated industry, as it is to do with the range of…
…been studied at length by psychologists and used in advertising, sales, marketing and other sectors. But the impact of cognitive biases in cybersecurity is often neglected or isn’t studied in…
…under that duvet!)? The cyber insurance market was worth approximately $7bn in 2020. This is expected to triple to more than $20bn by 2025. Despite the projected growth, the market…
…strategy not only as a major element of competition in high-tech markets but also as a strategic challenge to US global leadership. In this context, the US trade war against…
…and accessibility requirements when attending events, to resolve complaints, to market events and promotions, to inform on new services and to aid and improve the user experience when accessing this…
…Marketing and Advertising sector: Organisations will begin utilising the data from sensors and cameras to create tailored content around marketing and advertising products. Behavioural analytics will create ‘data doubles’ as…
…observability platform. The cyber insurance market is growing, and has the potential to grow substantially. German reinsurance giant Munich Re said in September 2018 that it would grow to $8…
…cyber security in the boardroom, effective risk management post pandemic, human-centred security and the ISF’s trademark, forward looking threat assessment, Threat Horizon 2023. This year’s event included thought provoking and…
…be the first in the market, and the absence of global security governance. The need for security by design is well understood. “Today, we are able to discover, assess, quantify…
…security industry, he graduated with a degree in French and studied for his Chartered Institute of Marketing qualifications before moving into the working world. What was your route into the…
…matter of time before this national framework became an international benchmark. Thus, the updates to the CSF acknowledge this new reality, where the CSF 2.0 has outgrown its original purpose….
…shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where…
…poor marks. While the action was not unexpected, the landmark nature of the outlook should provide some needed emphasis to both boards of directors and CISOs of the modern business…
…collaboration, to resolve complaints, to market events and promotions, to inform you on new products and services, to aid and improve the user experience when accessing events and participating in…
…with significant investment in the UK, US and Chinese markets. The estimated global market value for AR technologies is set to grow from $4 billion in 2017 to $60 billion…
…traditional entertainment and gaming markets into areas such as retail, manufacturing, engineering and healthcare. Attackers will perform man-in-the-middle attacks on AR-enabled devices and infrastructure, gaining access to intimate and sensitive…
…is a key access point in the cloud Human error drives cloud risk A versatile IT Professional of 18 years, Mark has excelled in network redesign, server migration and…
…of global players in the information technology market, “digital control” over the lives of citizens becomes total, actively invading the jurisdictions of nation states around the world. In 2021, the…
…what we’re about is breaking the rules.” That, in a nutshell, is the drone problem: an explosive (potentially literally) new market with virtually no governance beyond ‘exclusion zone’ rules —…
…an expanding market opportunity for IoT devices, which can be split into two categories: consumer and industrial IoT. Consumer IoT Consumer IoT products often focus on convenience or adding value…
…a different way to look at vulnerabilities (also known as a vulnerability reward program (VRP)). Many large multi-national corporations already operate these programmes (e.g. Apple, Google, Facebook and Uber). A…
…that human-centered security is the way forward. The idea starts with a simple premise, and one backed up by empirical evidence; human beings tend to be the weak link in…
…forward. In many, if not all cases, extreme cyber attacks are a perfect opportunity for organisations to secure future budget for resilience and recovery-based initiatives, such as overhauling legacy systems…
…made aware of the consequences of their actions. Legislation must also encourage victims to come forward and explore avenues of legal remedy. Cybercrime offenses have a low conviction rate, which…
…These organizations view it as a growth driver, a key to innovation, and a competitive advantage. (Roman and medieval shields, after all, were used for defense and for pushing forward…
…remote-work shift for security teams going forward. A Mobile-Focused Security Policy is a Must As workers went home, mobile devices became more ascendant, with many of the new go-to collaboration…
…to look at vulnerabilities (also known as a vulnerability reward program (VRP)). Many large multi-national corporations already operate these programmes (e.g. Apple, Google, Facebook and Uber). A bug bounty is…
…newly emerging landscape required swift innovation and forward-thinking organizations seized the opportunity to reevaluate infrastructure and policy. With the dust settling, it’s time to turn our eyes toward the year…
…Practice for Information Security 2020 (SOGP 2020), the ISF Benchmark, the ISF Information Risk Assessment Methodology 2 (IRAM2) and the ISF’s research programme. Identify. Assess. Protect Designed to be as…
…expecting to see positive results. As life gradually returns to normal, what can businesses take forward from this period of upheaval? We must see this situation as an opportunity to…
Scammers, cyber-thieves and computer criminals are not far behind pornographers when it comes to exploiting technology innovations for their own purposes. Every time technology takes a leap forward, enterprising hackers…
…(ISF.org) finds a thriving marketplace on the Dark Web full of wannabe criminals. Products and services start as low as $300 simply to have an individual hacked. A young adult…
…that the cybersecurity workforce needs to increase 62 percent in the U.S. market, ISC(2) said. Trouble Spots The fundamental causes for the skill gap are myriad, starting with a lack…
…toward illicit data manipulation to compromise the accuracy and credibility of information, thus puncturing the integrity of the data organizations use to drive their businesses forward. 2. Misleading signals will…
…for, among others, Caesar’s Palace, Lego, Omega, Vera Bradley, and Yamaha. Bob shares his perspective on digital transformation in the retail market, building a solid team, and effective communication within…
…new technologies, the geopolitical arena is likely to become complex, turbulent and fragile. More inward-facing policies will be a result of frustration with liberalism and globalism, while national and commercial…
…with one active user account, in case a department head requests the need to use them.” – CISO. Even legacy systems can vary, with many security professionals highlighting a marked…
…sales and marketing, and support them in acquiring some of the security skills we seek? The truth is that it’s very difficult to train somebody in the softer, emotionally intelligent…
…cyber insurance market of $20 billion by 2025. Combine this with industry analysts observing low ‘loss ratios’ for cyber insurance, and what emerges is a seemingly healthy and highly profitable…
“Criminals have become more sophisticated by considering the psychological aspects of an attack,” says Mark Chaplin, principal at the Information Security Forum. Fraudsters are taking advantage of the global COVID-19…
…from the ISF Benchmark and major external developments including new legislation and other requirements, The Standard is business-friendly and used by many global organizations as their primary reference for information…
…and cross-reference aids, including a rebuilt Benchmark platform and the new IRAM2 WebApp. Aligned to the latest version of the Standard of Good Practice for Information Security 2020 (SOGP 2020),…
…market as manufacturers look to make money from this newer capability. Quotes from Paul Holland, ISF Principal Research Analyst In April 2020, the FCC voted to open 6 GHz for…
…enables you to navigate the intricacies of the market and complexities of a cyber insurance policy by: Clarifying the type of financial losses covered by cyber insurance Outlining key considerations…
Here are five questions to help determine if your company needs cyber coverage. The cyber insurance market is rapidly maturing and there are many reasons for this. Companies are increasingly…
…of averages mean that there are high-level similarities between individuals banded together in these generations… Historically, marketers, branding experts and politicians have analysed the trends and preferences exhibited by individuals…
With all the hype in marketing, some topics get way too much attention, while other — in some cases, more important — topics languish because they’re not as sexy or…
By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and…
…of big tech companies. As these companies grow stronger through diverse revenue streams and enhanced investment power, they may create barriers to entry in the global digital marketplace that will…
…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….
…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….
…their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role…
…whose companies have a vision that shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting…
…to the forefront, businesses are at an increased risk of losing both their revenue and reputation. According to Deloitte, a negative trust-related event can erode an enterprise’s market cap by…
…example, a deepfake video of Ukrainian president Volodymyr Zelensky, urging Ukrainians to lay down arms was broadcast on Ukrainian TV. Stock markets A threat actor wants to make a quick…
…Act (DPA) would create a consumer watchdog to give Americans control and protection of their data, promote a competitive digital marketplace, and prepare the U.S. for the digital age. Introduced…
…to merge, allowing global criminal networks to expand, and cybercrime becoming an increasing issue for law enforcement and politicians. In this interview, Misha Glenny, award-winning writer, broadcaster and author of…
…at every step of the way. Anyway, what does 2019 is looking forward to with regards to digital dangers? Let’s discuss the five dominant big data and cloud security concerns…
…a veritable Who’s Who of government, business, and technology, including some of the world’s most technically sophisticated organizations. Moving forward, organizations of all sizes need to prepare to be targeted…
…These are questions CISOs must help answer. Risk is a business decision and not a security decision — while it’s the CISO that initiates the risk and reward discussion, it’s…
…Inc., said the company has a straightforward process for revoking credentials when an employee leaves. But when employees transfer internally, the security team must manually review their credentials and determine…
…meeting the needs of Chief Information Security Officers and other business leaders. Examples include: Engaging with the Board: Balancing cyber risk and reward Information Security Strategy: Transitioning from alignment to…
…around AI and cybersecurity In Demystifying Artificial Intelligence in Information Security, the ISF’s latest digest, the organization hopes to shed light on AI’s risk and reward for cybersecurity. The conversation,…
…the Information Security Forum (ISF). “By 2021 the world will be heavily digitized,” says Steve Durbin, Managing Director, ISF. The top cyber security concern moving forward, he says, is “technology…
…procurement processes. Still, old systems will continue to pose problems. “We’re in a better place going forward than we ever were, but we’re having to deal with legacy,” he adds….
…it takes, which is what happens with conventional penetration testing. This encourages the hackers to delve deep and discover something – the more critical the vulnerability, the bigger the reward.…
…in that it is the only annual report that looks forward two years to predict the threat landscape whilst rigorously reviewing the past three years of predictions. In this way…
…forward. About our speakers Steve Durbin, Chief Executive, ISF Steve Durbin is the Chief Executive of the Information Security Forum (ISF). His main areas of focus include strategy, information technology,…
…pressure to transform as quickly as possible. However, uncontrolled and rapid transformation can increase both business risk and potential reward. Security and business leaders have become disengaged at a critical…
…and it no longer provides the required protection, as many organizations have discovered. Going forward, organizations must extend risk management to include risk resilience, in order to manage, respond and…
…team will bring the CISO significant reward when it comes to managing cyber risk. Here are five steps to get started. Engage with the CRO to understand approaches taken for…
…teams, everybody, on security. Not just by saying no, but how can I help you to get better? How can I help the company to move forward whilst maintaining security?……
How forward-looking is your cyber security strategy? ISF’s Strategic Threat Analysis is a short-turnaround, high-impact engagement to review and sharpen your cyber security roadmap and create a board-ready outcome to…
…a critical period. Rapid digital transformation promises to drive innovation, efficiency, and prosperity to business. However, it can drive up risk as well as reward, with tragic consequences if the…
…cyberspace is possible going forward. I think privacy by design will become more important when we go to the development of AI, because at a certain moment, the insecurity of…
…protections needed to ward off the kinds of organized, sophisticated and widespread attacks that have crippled public- and private-sector systems in recent years. Defense Department, the Central Intelligence Agency and…
…looks like – including any financial or other reward for confirmed vulnerabilities disclosed through the programme. There is no particular standard for defining your approach to RD or even how…
…a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking companies must plan to mitigate the potential risks now. Steve Durbin, ISF CEO…
…making the corporate network more like an Internet of Sieves. The humble printer is here to stay, and the magic of paper and the printed word should be reward enough….
…it must be protected and secured going forward. These are the types of conversations that CSOs and CISOs are having about the risks their organizations face in a permanent work-from-home…
…a list of suggested actions to aid you in formulating a forward-looking cyber resilience strategy. The event will be run under the Chatham House rules. Meet our sponsor OpenText is…
…in cybersecurity incidents. This trend has real implications for the way we manage both our people and our critical assets going forward. Working in a much more distributed and, therefore,…
…and PwC, he has had a technology-forward approach from day one having been at various points in his career an expert and evangelist of 5G, OT, IoT, and AI cybersecurity….
…that an amount of loss (usually financial) will be incurred. The most straightforward way to measure risk is to take an annual period, count the number of information security incidents…
…greatest reward. Determine Approach Armed with objectives, it’s time to drill down into the current state of your existing architecture and projects. Analyze and document the core characteristics and components….
…be reported to and where they should forward the message, they can just click that button right in the email and it will be investigated. The physical environment can also…
…these cuts will be temporary and that forward-thinking organizations know that security can’t be slashed at a time when adversaries are finding more and more ways into enterprise networks. If…
…Forum. “Moving forward, end users should receive ample security awareness, education and training on the threat of ransomware, particularly its delivery mechanism,” Norman said in an emailed statement. “Typically, the…
…Dice. “It has accelerated and concentrated forces, such as the move to remote working and adoption of cloud services, that were already in motion. Moving forward in 2021, organizations must…
…to consider moving forward: Bring the federal government together. Think of the federal government as a patchwork quilt, it’s made up of lots of different fiefdoms. It’s quite a challenge…
…collective course. (3:50) 2. Staying vocal as a leader. (6:05) 3. Whether something goes to plan or not, an autopsy of the scenario can be a helpful way forward. (10:06)…
…benefit. As companies look to reduce costs, AI is fast becoming more attractive as a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking…
…liabilities are in sharp focus here, and if the CISO is to be personally liable going forward, what does this really mean for the role? Thirdly, what are the implications…
…not about the reward. It’s about the recognition…babies cry for it and grown men die for it. That’s what recognition is… Tune in to hear Steve and Christy talk about:…
…resources that have supported them on their journey, and the industry advancements they are most looking forward to seeing play out in the future. …I think Mentorship is hugely…
…of the next-generation CISO, however, they stand out as key differentiators of forward-looking professionals. The six differentiating characteristics include: Balancing Opportunity with Risk Demonstrating Leadership Managing Incidents and Crises Finding…
…brought in the wake of former CIA subcontractor Edward Snowden’s revelations that the NSA was running a covert program that spied and collected data on U.S. citizens. In today’s decision,…
…users to download software as a precursor to being able to use one’s website or online services – even if it’s security software – introduce more risk than reward? “In…
…will enter the workplace, introducing new information security concerns to organizations. Their attitudes toward sharing information will fall short of the requirements for good information security. Reckless attitudes to sharing…
This landmark study provides private- and public-sector leaders with evidence-based insights into the cybersecurity practices and investments that are most effective for mitigating risks. ThoughtLab, a leading global research firm,…
In this episode, ISF Chief Executive, Steve Durbin speaks with Mark Ralls, President and COO of Invicti Security – a Texas-based company that provides dynamic web application security solutions. They…
…respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF | James Tamblin, UK President, BlueVoyant | Steven Moran, Head of Information Security Governance,…
…successfully walk this tightrope will not only have a clear competitive advantage but also propel themselves to be on a path to becoming market-leading enterprises. Read the full article here…
…can automatically transform the buyer into a zero-trust organization. Even though there are several products on the market that certainly claim to do so, no single product in isolation can…
…the board, security practitioners, vendors and authorities will play in helping enterprise prepare, respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF |…
…rarely get their data back in full. It’s not that these companies don’t receive the decryption keys after paying because, after all, ransomware groups need to sustain their market reputation…
…that the Giant Group attack may lead some other umbrella company firms to reassess their own security posture, contracting market stakeholders hope the incident might prompt the UK government to…
…Businesses are pouring billions of dollars in AI and automation, and the Industrial IoT (IIoT) alone is set to become a $500 billion market by 2025. IT/OT convergence could spell…
…Unrealistic expectations and complacency can lead to disaster. Lack of Understanding Automated cybersecurity is a competitive space. The SOAR market is growing fast and expected to reach $1.3 billion by…
…for marketing purposes. Personal data we collect via cookies Cookies capture your computer’s unique online electronic identifier; this is known as an IP address. Your IP address is considered to…
…check them for changes because they are binding on you. Trademark ISF and Information Security Forum are UK Registered trademarks Applicable law The English courts have the only right to…
…six years at Manhattan Associate’s as a Design Lead where he collaborated with customers and R&D directors to identify market trends and opportunities for efficiency gains within clients distribution centers…
…improved by using marketing techniques that have been well established over the years. The security team can use visual and audio content such as jingles, slogans, phrases and music to…
…consequences could dramatically reduce the share price, erode market value and expose the business to a number of class action suits or federal and regulatory investigations. How can information security…
…conversation with: David Thornewill – Group CISO at DHL Marc Gibson – Owner and CEO of DThree Technologies Alexander Seger – Head of Cybercrime at the Council of Europe Mark…
…sixteen years as a security executive and CISO in several industry sectors including financial services, retail, critical national infrastructure, food and beverage, data analytics and market research. A certified information…
…labor market push up wages. This was the view of a panel of chief information security officers, speaking at Infosecurity Europe. But there are steps that organizations can take to…
…in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA at KnowBe4, he helps organisations of all sizes understand why more emphasis is…
…an independent oversight board for Meta and former Prime Minister of Denmark, explores how to balance online regulation and freedom, and shares insight into the crucial role of leadership in…
As Principal of Services, Benelux, Esther Schagen-van Luit is responsible bringing ISF research and tools to the Benelux market and helping members make the most of their membership with the…
…Mark Chaplin, ISF Principal, will provide insights from many of Cyber Simulation Exercises he and his team run for leading organisations in the ISF Membership. You will learn about best…
…Director at investment bank, LD&A, now Drake Star, and Associate Director at Gartner, in the Market and Business Strategy practice for the vendor community. Jean-Michel developed a taste for security,…
…can be valued according to one of the three following approaches: the future revenue that could be generated from it, the value similar data has in an active market and…
…years of experience in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA for KnowBe4, he helps organizations of all sizes understand why…
…borders in our market – goods move freely, people move freely, money moves freely. Well, that means our systems are interconnected…if you have one country that is the weak link,…
…security posture is sufficient to prevent cyber attacks and ensure information security. Watch as SecurityScorecard’s Josh Fazio, Sr. Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, dive into…
When technologies and markets are still in their infancy, it is difficult to predict how they will evolve and what the implications might be. The recent fundamental shift in AI…
…transformations within organisations must be carefully planned, especially if the organisation is competing in the highly innovative markets. Whilst there are big opportunities with such a gamble, there are big…
…and KRIs help answer and this is why practitioners must be laser-focused on KPIs and KRIs to benchmark their security performance, preparedness, and effectiveness. How can security teams measure cyber…
…It’s about adapting security around the macro cyber security environment and where the markets are taking us from an economic and trade standpoint. How can organisations tackle these cyber security…
…detection and response (EDR) marketplace – there are some amazing products out there. And if you aren’t rocking a security operations centre (SOC), I recommend a managed solution (MDR) if…
Alex works across the ISF Tools portfolio to ensure that deliverables provide maximum value to Members. He has previously led the ISF’s software development activities for the ISF Benchmark, was…
…their thoughts and ideas, turned out to be great insight that allowed me to then put together a plan…because they knew the market best, of things that could be different……
…to reinforcing and measuring your InfoSec risk program. In this session, Jorge highlights some of the latest market insights from InfoSec leaders, peers, and industry analysts, examining the driving factors…
…benchmark before investing in a programme, then they fail to understand why they cannot demonstrate a return on investment or the impact the programme is having on behaviour. For example,…
…the 2020 Information Security Standard of Good Practice, to be shortly followed by our new Benchmark. We have also started research on Supply Chain Continuous Assurance, Addressing Extinction Level Events…
…for near-instantaneous connectivity and reduced latency will invigorate to edge computing technologies, architectures and solutions. The desire for edge computing could see its market value grow to $28 billion by…
…weak controls at technology providers could allow hackers into their own systems. Regulators are also concerned that a cyberattack that takes down a major financial company could destabilize markets. Questionnaires,…
…unprepared workforce. At the same time, natural forces will wreak havoc on infrastructure. Invasive technologies will be embraced across both industry and consumer markets, creating an increasingly tumultuous and unpredictable…
…this clearly presents a challenge for a new entrant. “That being said, those that are able to sufficiently differentiate themselves through smart marketing interactions that demonstrate value to the target…
…of data. Is there a negative outlook for businesses in the cybersecurity industry, despite the optimism of market predictions? Steve Durbin, managing director of the Information Security Forum disagreed, saying…
…ethically-based, digital play on the use of data to deliver quantifiable and immediate value to CISOs of all size companies. This will include both internally focused and market driven data.”…
The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn. In the midst of the ongoing…
…and tools overload the market, potential employees have come to recognize information security and compliance as deeply technical, leaving recruiters struggling to identify and appeal to candidates with a less…
…reflect the latest findings from the ISF’s research program, input from global ISF member organizations, trends from the ISF Benchmark and major external developments including new legislation and other requirements,…
…equipment made by companies in China that have strong ties to that country’s government and the military. The questionable equipment includes Lenovo computers, Lexmark printers and GoPro security cameras. While…
…for IoT devices made and used across the US and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately…
…competitors and destroy corporate reputations. Fraudsters will manipulate financial markets by releasing exploits at opportune moments. A lack of regulation will lead to a culture of digital vigilantism whereby vulnerability…
…services will be restored, as cloud providers scramble to prioritise customer recovery. Further consolidation of the cloud services market will create a small number of distinct targets that underpin a…
…the CISO Alignment with business strategy (e.g. reporting in the context of the organisation’s main focus areas, such as major business projects, global operations, new markets or product and service…
…to a recent analysis released by Risk Based Security. The high-water mark for data breaches remains 2017, but there’s only a 3.2 percent difference in total incidents between that year…
How can organisations best use unified threat management tools to help stem the tide of data breaches? Navigating the plethora of security products on the market to select the right…
…for being too expensive, costing industry more than £6.6bn a year, according to a report. The report is based on a market snapshot survey of 400 UK businesses of various…
…and NIST as well as peer and industry sector groupings. Why work with ISF to run your Security Assessment and Review? Based on the unique ISF Benchmark, the ISF Security…
…an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach…
…consent, with attackers targeting and compromising poorly secured systems and databases at will. Impacts will be felt across industries such as retail, gaming, marketing, and insurance that are already dependent…
…significant impact on not only domestic but also global economic practices. Markets will have a reactionary response to the volatility and uncertainty driven by protectionist policies and practices. The weaponisation…
…of respondents to the ISF Benchmark stated that they do not subject critical systems under development to cyber attack simulations or exercises. This may be because cybersecurity exercises are perceived…
…and marketing legal, regulatory and contractual compliance. Emphasise the importance of representing all aspects of the organisation Agree on areas of the business for which they require specific or increased…
…about it here. Mark Chaplin is an experienced information risk management professional with approximately 30 years of experience in the technology and information security industry. He specialises information security governance…
…first woman to be promoted to this position in over three centuries of the company’s history. She is known for leading the global insurance and reinsurance market for five years,…
…can support their teams throughout this unprecedented period of change; the difference between good leadership and great leadership; and more. This episode marks the beginning of our podcast’s fifth year…
…rapidly identify and build new routes, form fresh partnerships, and ensure a steady flow of product in the face of major fluctuations in demand. While some markets have dwindled with…
…great leader: Always try to improve. A hunger to further your knowledge and understand everything in your business is the hallmark of a good leader. Strive to listen when there’s…
…systems and technologies, both existing and new, a key focus. This must then filter down from the top into day-to-day business functions such as Human Resources (HR) and marketing. Not…
…outset. However, with a significant number of IoT devices already in circulation, connected and on the market, users have a real responsibility to proactively protect their devices and the information…
…increase speed to market for new ideas, he explained. OSS is often seen as being insecure and unsupported. As these negative connotations continue to taint its reputation, some organizations officially…
…welcome, there are nevertheless caveats. The cybersecurity workforce is a huge and diverse market, and the in-demand skill set is constantly changing. We don’t know where the 700,000 additional staff…
…products. “The market for ‘ransomware-as-a-service’ has boomed over the last few years,” Norman told TechRepublic. “Anyone with access to the Dark Web can buy readily available ransomware kits for less…
…contextualized to specific role requirements. For example, a senior executive will not experience the same threats as a marketing manager, so why should they both have to complete the same…
…both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach to security and resilience will be crucial as a hybrid threat…
…security workforce, organizations should adapt to market demands by seeking candidates with diverse competencies and skill sets coupled with providing competitive benefits and structured career development. For some these changes…
…and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately managed, it will fast become a major security concern…
…from the digital world have an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The…
…markets, promote political agendas or gain competitive advantage. Severe reputational damage will be caused when executives or high-profile individuals have their identities compromised. Organizations and individuals will face a new…
As 2023 draws to a close and 2024 looms ahead, we find ourselves grappling with a landscape marked by economic recession, societal unrest, and intensifying geopolitical strife. In the face…