Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Demystifying Zero Trust
Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.Read more
Review and gap analysis of cybersecurity legislation and cybercriminality policies in eight countries
The ISF, in conjunction with CC-DRIVER, a consortium of 13 partner organisations from industry, research…Read more
Legal and Regulatory Implications for Information Security: People's Republic of China
Read the latest ISF research on how the Personal Information Protection Law (PIPL) will affect organisations how CII operators must follow and report on data protection and security procedures.Read more
The ISF Benchmark
The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.Read more
ISF Aligned Tools Suite 2020
The ISF Aligned Tools Suite 2020 Executive Summary outlines 8 cyber challenges that cybersecurity professionals and organisations are facing.Read more
Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…Read more
ISF Rapid Security Assessment
The Rapid Security Assessment (RSA) provides a high impact, peer-validated Information Security Management System (ISMS)…Read more
Protecting the Crown Jewels
Can you be sure that you know exactly where your organisation’s most critical information assets…Find out more
Standard of Good Practice for Information Security
The ISF’s Standard of Good Practice for Information Security 2020 (SOGP 2020) is the most…Find out more
Best of 2021
In today's episode, we're sharing a compilation of some of our listeners favourite episodes from…
Emerging Threats for 2022: Q&A
In this episode, we’ll hear the presentation’s Q&A session, in which Steve responds to the audience questions.
The Future of Digital Governance
Viviane Reding, former First Vice-President of the European Commission, sits down with ISF Chief Executive,…
Table Top Cyber Simulation Exercise
As a security leader you are considered the front line of defence, so how do you prepare the business, C-suite and security teams to survive an attack and respond effectively?
Cyber Security Exercise - Finland
Test and prove your ability to respond to a Ransomware / Cyber attack on your…
Mitigating Ransomware Attacks
Mitigating Ransomware Attacks - Cyber-criminals have become thoughtful about ransomware attacks, taking time to maximise…
Ways to survive the ransomware menace
As enterprise clammers to address the ransomware threat of today, what steps should you be…Watch Now
Colonial Power - Todays Cybercrime Pandemic and what to do about it
Panelists from the ISF CxO Roundtable - Today's Cybercrime pandemic and what to do about…Read more
Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it
Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…Watch Now
The 6 Best Practices to Prevent Ransomware Infection
Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.
"log4j 2" - a perfect way to ruin a security professional's weekend
By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.
Zero Trust: Five Misconceptions Every Business Should Avoid
Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.