Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Securing Your Supply Chain: Risk-based supplier assurance when it's most needed
Discover how the ISF Supplier Security suite equips you to respond to five supplier risk challenges presented by today’s threat landscape.Read more
Threat Horizon 2024: The disintegration of trust
Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?Read more
Review and Gap Analysis of Cybersecurity Legislation and Cybercriminality Policies in Eight Countries
The ISF, in conjunction with CC-DRIVER, have released a report detailing new methods to prevent, investigate and mitigate cybercrime.Read more
ISF Aligned Tools Suite 2022
The ISF Aligned Tools Suite has been designed to help organisations maintain agility and confidence when meeting current challenges head on.Read more
The ISF Benchmark
The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.Read more
Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…Read more
Threat Horizon Planning Exercise
The Threat Horizon Planning Exercise provides an actionable, tailored plan to help business leaders and…Find out more
Policy and Standards support
The ISF’s Standard of Good Practice for Information Security is the most comprehensive information security…Find out more
The EU General Data Protection Regulation (GDPR)
With the EU’s General Data Protection Regulation (GDPR) in full force, it is important that…Find out more
The Ethical Dilemma of AI & Innovation: Part two
Steve wraps up the second part of two episodes discussing the ethical dilemmas that are posed by AI and innovation.
Technology Choices Limit Control
Steve continues to break down the three major themes in the recently released Threat Horizon 2024: The disintegration of trust report.
Regulations Have Unintended Consequences
Steve delves into the first major theme, 'well-intentioned regulations can have unintended consequences', from Threat Horizon 2024.
On Demand Events
Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.
Top 5 Board Level Concerns for Zero Trust
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.
Change Automation: Turning Network Security Alerts into Action
You use multiple network security controls in your organization, but chances are, they’re not talking…Watch on-demand
Three Unintended Consequences of Well-Intentioned Cyber Regulations
Steve explains how you can prepare against unintended consequences of cyber regulations, no matter how well-intentioned they might be.
5 Levers Lawmakers Can Use to Tackle Cybercrime
Steve Durbin breaks down each element of the cybersecurity framework presented in the recently released report led by the ISF with CC-Driver.
Revised Scope of UK Security Strategy Reflects Digitised Society
The omission of the word ‘security’ from the title of the UK government’s new National Cyber Strategy is a telling one.