Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research

Cybersecurity Solutions for a Riskier World
A ThoughtLab study providing evidence-based insights into the most effective cybersecurity practices and investments.
Read more
Information Security in Mergers and Acquisitions
This excerpt from the full ISF briefing paper introduces a typical four-step process and helps promote the value of security in M&A activity.
Read more
Tools

ISF Aligned Tools Suite 2020
The ISF Aligned Tools Suite 2020 Executive Summary outlines 8 cyber challenges that cybersecurity professionals and organisations are facing.
Read more
Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…
Read moreConsultancy Services

Request an ISF Zero Trust Readiness Assessment
The Zero Trust Readiness Assessment (ZTRA) provides an independent, actionable assessment of your organisation's readiness…
Read more
Cyber Risk for Mergers and Acquisitions
The ISF Cyber Risk Review provides access to the trusted, independent, and confidential resources of…
Read more
Cyber Security Exercise
ISF Consultancy Cyber Security Exercises immerse your team in realistic, tailored scenarios, testing your organisation’s…
Find out morePodcasts

Protecting IP in a World of Streaming and Sharing
This episode expands upon the challenges of protecting content and intellectual property in today's rapidly expanding digital sphere.

Keeping the M&A Process Secure
Carl Allen discusses the resurgence of M&A activity and the need for CISOs and security to take a front seat in the process.

The Cost of the FUD Approach to Security
Mark Ralls touches on the current threat landscape, security by design, and developing the next generation of cybersecurity talent.
Events
Upcoming Events

Cyber Security Exercise - Belgium
Test and prove your ability to respond to a Ransomware / Cyber attack on your business at our next Cyber Security Exercise in Brussels.

Optimising Third-Party Risk
Join Sam Parker, Senior Offering Manager at OneTrust, as he addresses enhancing your third-party risk program and automating data management.
On Demand Events

CxO webinar series: Preparation – Communicating in a Cyber Crisis
Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…
Watch on-demand
CxO webinar series: Detection & Analysis – Stories from the front lines
Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…
Watch on-demand
ISF: Managing Human risk in times of uncertainty
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…
Watch on-demandVideos

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it
Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…
Watch Now
ISF Interviews: Colonel Chris Hadfield meets Steve Durbin
Welcome to the Information Security Forum videocast series featuring interviews with world-renowned cyber experts and…
Watch now
ISF Video: Steve Durbin Interview with The European
Today, data breaches are no longer a question of if, but rather a question of…
Watch NowNews
How Cybersecurity Leaders Can Add Value to M&A Deals
Steve Durbin offers advice on the M&A process: how you can mitigate risk and highlight to leadership the value of information security.
World's Largest Cybersecurity Benchmarking Study Finds that Top Executives Believe their Organizations are Not Prepared for New Era of Risk
ThoughtLab's press release for their study, providing evidence-based insights into the most effective cybersecurity practices and investments.
Five Proactive Steps CISOs Can Take During Times of Instability
Steve Durbin outlines how CISOs can shift from being reactive to proactive, improving the overall resilience of their organisation.