Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research

ISF Resources to Help Adopt the NCSC Cyber Security Toolkit for Boards
Demonstrate that the appropriate measures are being implemented to embed cyber resilience best practice with key ISF resources.
Read more
Threat Intelligence:
React and Prepare
The digital revolution presents opportunities to identify and exploit the rising value of information. But this same value also attracts unwanted attention and risks.
Read more
ICS Insights:
Organic convergence
Has your organisation considered the complexity of environments within its ICS security controls?
Read moreTools

Standard of Good Practice for Information Security
An internationally recognised set of good practice covering all aspects of cyber resilience, cloud security and information risk management.
Read more
ISF Aligned Tools Suite 2022
The ISF Aligned Tools Suite has been designed to help organisations maintain agility and confidence when meeting current challenges head on.
Read more
The ISF Benchmark
The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.
Read moreServices

Risk Practitioner Training
A high-impact learning programme to inspire the next generation of information security practitioners and leaders at your organisation.
GET IN TOUCH
Human-Centred Security Assessment
Determine the reasons individuals exhibit poor security behaviour and engage your workforce to better protect your organisation from attack.
GET IN TOUCH
Strategic Threat Analysis
Review and sharpen your cyber security roadmap and create a board-ready outcome to present your strategy to senior stakeholders.
GET IN TOUCHPodcasts

Balancing the Risk and Reward of AI
Ellie Pavlick highlights the need for regulation in AI and how organisations implementing it must also develop the talent to support it.

AI Futures: Assessing the danger
Having explored the staggering potential of AI in business, the focus now shifts to questioning…

Rethinking Risk to Empower Innovation
Mo Gawdat returns to provide his perspective on balancing a culture of security with the continuous need to innovate.
Events
Upcoming Events

Rotterdam 2023, ISF World Congress
The ISF World Congress is a key international conference for global senior executives and business…
On Demand Events

Using the SOGP and CCM for Multi-Cloud Security
A webinar exploring how the cross reference can help security practitioners deploy effective controls over their multi-cloud environments.

Illuminate the Blind Spots: Why your security investments are failing
Watch as Dawid Kowalski from FireMon explores how to illuminate the blind spots and really protect your perimeter.

Threats to Watch Out For: A CISOs guide to application security
John Stock from Outpost24 provides insight into the most pressing threats in application security and how to effectively mitigate them.
Videos

Risk Assessment in Bitesize
Gain a comprehensive view of how ISF can enhance your team's ability to deliver actionable assessments of information risk.
Watch now
CISOs, Warfare and Technology in the Spotlight
Journalist Nicholas Witchell puts Steve Durbin in the 'cyber hot-seat' for fifteen minutes of timely rapid-fire questions.
Watch now
Ways to survive the ransomware menace
As enterprise clammers to address the ransomware threat of today, what steps should you be…
Watch NowNews
Invest in Developing a Human-Centred Security Program
Steve Durbin explores steps to developing a human-centred security program that engages your workforce to better protect your organisation.
Navigating the Politics of Measuring Security
Richard Absalom explores the soft skills needed to navigate boardroom politics, ensuring measurements support decisions and drive action.
Build Cyber Resiliency With These Security Threat-Mitigation Considerations
Steve Durbin offers insight into how organisations can get on the path to developing a coherent security strategy.