Solutions and Insights

Tackle your security challenges with our trusted solutions and valued insights.

Research

(Showing 3 of 27)
Array
Research

Threat Horizon 2024: The disintegration of trust

Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?

Read more
Array
Research

Cybersecurity Solutions for a Riskier World

A ThoughtLab study providing evidence-based insights into the most effective cybersecurity practices and investments.

Read more
Array
Research

Information Security in Mergers and Acquisitions

This excerpt from the full ISF briefing paper introduces a typical four-step process and helps promote the value of security in M&A activity.

Read more

Tools

(Showing 3 of 10)
Array
Tool

ISF Aligned Tools Suite 2022

The ISF Aligned Tools Suite has been designed to help organisations maintain agility and confidence when meeting current challenges head on.

Read more
Array
Tool

The ISF Benchmark

The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.

Read more
Array
Tool

Standard of Good Practice for Information Security 2020

The goal of every information security professional is to enable the organisation to conduct its…

Read more

Services

(Showing 3 of 8)
Array
Service

Tailored Training

Focused, private courses tailored to your organisation, leveraging the unmatched ISF library of best practices, methodologies, and tools.

Read more
Array
Service

Threat Horizon Planning Exercise

The Threat Horizon Planning Exercise provides an actionable, tailored plan to help business leaders and…

Find out more
Array
Service

Cyber Risk for Mergers and Acquisitions

The ISF Cyber Risk Review provides access to the trusted, independent, and confidential resources of…

Find out more

Podcasts

(Showing 3 of 39)
Array
Podcast

Getting Smart About Threats

ISF analysts debate the past and future of threat intelligence, and explore how you can stay one step ahead of the evolving threat landscape.

published 05 - August - 2022
Listen Now
Array
Podcast

The Ethical Dilemma of AI & Innovation: Part one

Steve explores how organisations can establish responsible practices that mitigate bias in the design and deployment of AI systems.

published 19 - July - 2022
Listen Now
Array
Podcast

Dirty Data Disrupts Business

The final episode in the Threat Horizon 2024 series, Steve explores issues that could arise from organisations' dependence on 'dirty data'.

published 14 - June - 2022
Listen Now

Events

(Showing 3 of 34)

Upcoming Events

Array
Event

Cyber Security Exercise - Manchester

Test and prove your ability to respond to a high-impact ransomware attack on your business at our next Cyber Security Exercise in Manchester.

date 14th September 2022, 1:30pm to 5:00pm
Venue In person - Manchester, UK
Register Now
Array
Event

Cyber Security Exercise - Canada

Test and prove your ability to respond to a high-impact ransomware attack on your business at our next Cyber Security Exercise in Toronto.

date 21st September 2022, 8:00am to 12:00pm
Venue In person - Toronto, Canada
Register Now
Array
Event

Manchester 2022, ISF World Congress

ISF World Congress is a Members-only event for global senior executives and business leaders in information, cyber security and risk management.

date 12th - 15th November 2022
Venue Manchester, United Kingdom
Find out more

On Demand Events

Array
Event

Innovating Defence: The life of a Risk Operations Centre (ROC) analyst

Darin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.

Venue Online
Register Now
Array
Event

Preparing for a Cyber Crisis: The ISF approach

An ISF webinar detailing how you can design realistic, impactful cyber attack simulations and playbooks to strengthen your cyber resilience.

Venue Online
Watch On-Demand
Array
Event

Optimising Third-Party Risk

Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.

Venue Online
Watch on-demand

Videos

(Showing 3 of 5)
Array
Video

Ways to survive the ransomware menace

As enterprise clammers to address the ransomware threat of today, what steps should you be…

Watch Now
Array
Video

Colonial Power - Todays Cybercrime Pandemic and what to do about it

Panelists from the ISF CxO Roundtable - Today's Cybercrime pandemic and what to do about…

Read more
Array
Video

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it

Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…

Watch Now

News

(Showing 3 of 57)
News

Cyber Insurance: An effective use of your scant security budget?

Paul Watts questions whether cyber insurance is a must-have item, an expensive luxury, or the emperor’s new clothes.

published 21 - July - 2022
Read More
News

Three Cyber Threats Resulting from Today's Technology Choices to Hit Businesses by 2024

Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.

published 13 - July - 2022
Read More
News

Security Think Tank:
Balanced approach can detangle supply chain complexity

Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.

published 08 - July - 2022
Read More