Solutions and Insights

Tackle your security challenges with our trusted solutions and valued insights.

Research

(Showing 3 of 23)
Research

Demystifying Zero Trust

Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.

Read more
Research

Review and gap analysis of cybersecurity legislation and cybercriminality policies in eight countries

The ISF, in conjunction with CC-DRIVER, a consortium of 13 partner organisations from industry, research…

Read more
Research

Legal and Regulatory Implications for Information Security: People's Republic of China

Read the latest ISF research on how the Personal Information Protection Law (PIPL) will affect organisations how CII operators must follow and report on data protection and security procedures.

Read more

Tools

(Showing 3 of 10)
Tool

The ISF Benchmark

The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.

Read more
Tool

ISF Aligned Tools Suite 2020

The ISF Aligned Tools Suite 2020 Executive Summary outlines 8 cyber challenges that cybersecurity professionals and organisations are facing.

Read more
Tool

Standard of Good Practice for Information Security 2020

The goal of every information security professional is to enable the organisation to conduct its…

Read more

Consultancy Services

(Showing 3 of 5)
Service

ISF Rapid Security Assessment

The Rapid Security Assessment (RSA) provides a high impact, peer-validated Information Security Management System (ISMS)…

Read more
Service

Protecting the Crown Jewels

Can you be sure that you know exactly where your organisation’s most critical information assets…

Find out more
Service

Standard of Good Practice for Information Security

The ISF’s Standard of Good Practice for Information Security 2020 (SOGP 2020) is the most…

Find out more

Podcasts

(Showing 3 of 26)
Podcast

Best of 2021

In today's episode, we're sharing a compilation of some of our listeners favourite episodes from…

published 11 - January - 2022
Listen Now
Podcast

Emerging Threats for 2022: Q&A

In this episode, we’ll hear the presentation’s Q&A session, in which Steve responds to the audience questions.

published 21 - December - 2021
Listen Now
Podcast

The Future of Digital Governance

Viviane Reding, former First Vice-President of the European Commission, sits down with ISF Chief Executive,…

published 07 - December - 2021
Listen Now

Events

(Showing 3 of 6)
Event

Table Top Cyber Simulation Exercise

As a security leader you are considered the front line of defence, so how do you prepare the business, C-suite and security teams to survive an attack and respond effectively?

date 26 - January - 2022, 08:30 AM GMT
Venue In person - London
Register Now
Event

Cyber Security Exercise - Finland

Test and prove your ability to respond to a Ransomware / Cyber attack on your…

date 03 - February - 2022, 08:30 AM EET
Venue In person - Helsinki, Finland
Register Now
Event

Mitigating Ransomware Attacks

Mitigating Ransomware Attacks - Cyber-criminals have become thoughtful about ransomware attacks, taking time to maximise…

date 09 - February - 2022, 01:00 PM
Venue Online
Register Now

Videos

(Showing 3 of 5)
Video

Ways to survive the ransomware menace

As enterprise clammers to address the ransomware threat of today, what steps should you be…

Watch Now
Video

Colonial Power - Todays Cybercrime Pandemic and what to do about it

Panelists from the ISF CxO Roundtable - Today's Cybercrime pandemic and what to do about…

Read more
Video

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it

Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…

Watch Now

News

(Showing 3 of 40)
News

The 6 Best Practices to Prevent Ransomware Infection

Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.

published 21 - January - 2022
Read More
News

"log4j 2" - a perfect way to ruin a security professional's weekend

By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.

published 16 - December - 2021
Read More
News

Zero Trust: Five Misconceptions Every Business Should Avoid

Cybercrime is a major threat to every industry and organization in the world. No wonder global entities are desperately seeking a silver bullet that can somehow neutralize cybersecurity threats.

published 06 - December - 2021
Read More