Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Has your organisation considered the viable actions to reduce the risks posed if manufacturers are not carefully assessed and managed?Read more
Embedding Security into Agile Development: Ten principles for rapid improvement
Agile software development methods are proving a better match for today's demanding business environments than…Read more
Information Risk Assessment Methodology 2 (IRAM2)
A simple, practical, yet rigorous approach to risk assessments, enabling organisations to speak a common language with key stakeholders.Read more
Benchmark against peers to identify core areas of security that require attention and maximise return on investment.Read more
Standard of Good Practice for Information Security
An internationally recognised set of good practice covering all aspects of cyber resilience, cloud security and information risk management.Read more
Risk Practitioner Training
A high-impact learning programme to inspire the next generation of information security practitioners and leaders at your organisation.GET IN TOUCH
Once Upon a Time in Infosec
Rouzbeh Barzegar explains to Mark Ward and Paul Watts, how he developed an epic tale of King Infosecius to illustrate the concept of people, processes, and technology.
The Power of Inclusive Leadership
Former Prime Minister of Denmark Helle Thorning-Schmidt explores the responsibility of leaders to uphold the trust that people place in them.
The Great CISO Debate
Experience an exclusive session from the ISF World Congress in Rotterdam where an accomplished panel of experts dissect the role of the CISO.
Supply Chain Cyber Simulation Exercise - New York
Immerse yourself in a simulated cyber attack scenario in the supply chain of a fictitious organization alongside ISF experts.
ISF Annual Threat Update: Emerging Threats for 2024
Discover the prominent information security threats to expect in 2024 and crucial guidance on how to fortify against them.
NIS 2 Cyber Security Executive Roundtable
Join business leaders and C-level executives to debate strategies around the implementation, risks and rewards of the NIS 2 Directive.
Takeaways From the Security Middle East Conference 2023
Daniel Norman highlights his key takeaways from the Security Middle East Conference; exploring what the future holds for cyber in the region.Watch now
Benchmark in Bitesize
Gain a comprehensive view of how ISF can support you in reviewing performance against your industry peers and industry frameworks.Watch now
Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact
Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.
How organizations can navigate geopolitical and cyber risks in an interconnected world
Globalization and hyperconnectivity has made the world more interconnected and interdependent than ever before. The…
Walking the Tightrope: Navigating the risks and rewards of AI
Steve Durbin contributes to InformationWeek to chart the course for the responsible use of artificial intelligence.