Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research
Protecting The Crown Jewels: How to Secure Your Mission-Critical Information Assets
Your organisation depends on vital systems, data, and people - but are your mission-critical assets truly protected? Our framework delivers six actionable recommendations to strengthen resilience and secure what matters most.
Read more
Cyber Awareness: Kickstart your security culture
Trusted insights in an easy-to-share format designed to accelerate CISOs and their team's ability to build a resilient security culture.
Download now
Manage Emerging Threats in 2024
Discover the critical threats to expect this year and how to present them in terms that the business can understand and act on in.
Read moreTools
Standard of Good Practice for Information Security
A comprehensive, internationally-recognised security framework that guides organisations to better cyber security.
Read more
Managing Information Risk the ISF Way
The ISF Managing Information Risk the ISF Way Executive Summary provides an easy to read illustrative overview of the ISF’s most powerful and popular tools.
Read moreServices
Strategic Threat Analysis
Review and sharpen your cyber security roadmap and create a board-ready outcome to present your strategy to senior stakeholders.
GET IN TOUCH
Threat Horizon Workshop
A workshop-based engagement to challenge your organisation’s readiness to manage potential threat scenarios.
GET IN TOUCH
Controls, Policies and Standards Support
Develop, validate and improve your security controls and policies to create standards that staff across the business can easily follow.
GET IN TOUCHPodcasts
Privacy in the Age of AI and Surveillance
Baroness Kidron joins Steve Durbin to explore the critical importance of privacy in the age of AI and surveillance capitalism, and why...
Summer Listening: Cyber, CISO and the Board: Turning awareness into action
As digital transformation becomes embedded in every aspect of business, the relationship between CISOs and…
Summer Listening: Seán Doyle - Cyber and the World Economy
Seán Doyle sits down with Steve Durbin to discuss the role of public-private partnerships in the cyber landscape.
Events
Upcoming Events
Cyber Security Executive Briefing: Emerging threats for 2026
Connect with fellow leaders in an executive, closed-door session as Steve Durbin shares early insight into the top emerging threats for 2026.
On-Demand Events
6th Annual CISO 360 Middle East Conference
Securing Innovation, Building Resilience: CISO Leadership
TPRM 2030: Preparing for the AI-Powered Future
Join us for an exclusive webinar with Dave Stapleton, Chief Trust Officer at ProcessUnity, as he explores how AI is reshaping Third-Party Risk Management (TPRM).
Attend this webinar
Cyber Security Summit Hong Kong 2025
Join an influential community of C-suite and senior cyber security executives in Hong Kong to share knowledge and experiences.
Videos
Infosecuirty Magazine: Why Cybersecurity's Future Demands Business Savvy and C-Suite Alignment
In a recent conversation with InfoSecurity, Paul Watts, Distinguished Analyst at ISF, explores how cyber security teams are evolving to better align with business goals.
Watch now
Security Middle East Conference 2025 | Interview with Daniel Norman
In this insightful conversation, Daniel Norman, Regional Director EMEA at ISF shares his expert perspective on the current state of the security landscape, offering valuable observations on emerging trends and challenges.
Watch now
Takeaways From the Security Middle East Conference 2023
Daniel Norman highlights his key takeaways from the Security Middle East Conference; exploring what the future holds for cyber in the region.
Watch nowNews
Mastering Control In The Era Of AI And Transformative Change
In the age of digital-first, organizations are confronted with an unprecedented degree of technological disruption.…
Why a decade-long freeze on all state AI regs doesn’t make sense
Steve Durbin explores why a proposed 10-year freeze on state-level AI regulations could undermine innovation, accountability, and public trust.
How Tariff Volatility Creates Opportunities For Bad Actors
Tariff volatility can disrupt supply chains and expose businesses to cyber security threats. Learn how rapid responses to tariff changes may create vulnerabilities for bad actors to exploit.