Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Threat Horizon 2024: The disintegration of trust
Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?Read more
Cybersecurity Solutions for a Riskier World
A ThoughtLab study providing evidence-based insights into the most effective cybersecurity practices and investments.Read more
Information Security in Mergers and Acquisitions
This excerpt from the full ISF briefing paper introduces a typical four-step process and helps promote the value of security in M&A activity.Read more
ISF Aligned Tools Suite 2022
The ISF Aligned Tools Suite has been designed to help organisations maintain agility and confidence when meeting current challenges head on.Read more
Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…Read more
Quantitative Techniques in Information Risk Analysis
Quantitative techniques in information risk analysis are swiftly emerging as a method to deliver value through accurately measuring an organisation’s exposure to loss.Read more
Threat Horizon Planning Exercise
The Threat Horizon Planning Exercise provides an actionable, tailored plan to help business leaders and…Find out more
Request an ISF Zero Trust Readiness Assessment
An independent, actionable assessment of your organisation's readiness for implementing zero trust - in just 10 days.Learn more
Cyber Risk for Mergers and Acquisitions
The ISF Cyber Risk Review provides access to the trusted, independent, and confidential resources of…Find out more
The Ethical Dilemma of AI & Innovation: Part two
Steve wraps up the second part of two episodes discussing the ethical dilemmas that are posed by AI and innovation.
The Ethical Dilemma of AI & Innovation: Part one
Steve explores how organisations can establish responsible practices that mitigate bias in the design and deployment of AI systems.
Threat Horizon 2024: Risk and reward
Amanda Hallett and Karan Randhawa from Maersk offer insight into how they use Threat Horizon in their internal threat monitoring systems.
On Demand Events
The Future CISO: Securing the digital organisation of the future
Former CISO Paul Watts reflects on where CISOs find themselves today, and how they can ensure their role continues to add value.
Optimising Third-Party Risk
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.
Implementing a Zero Trust Strategy: The ISF approach
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.
Artificial Intelligence and Machine Learning Technologies
By invitation, Steve Durbin, Chief Executive of the ISF discusses Artificial Intelligence (AI) and Machine…Read more
ISF Annual Update: Emerging Threats for 2022
On Wednesday 8 December, 15.00 GMT/10.00 EST, Steve Durbin, Chief Executive, ISF held our annual emerging…Watch Now
ISF Interviews: Peter Hinssen, best selling author, meets Steve Durbin
Welcome to the Information Security Forum videocast series featuring interviews with world-renowned cyber experts and…Watch now
Three Cyber Threats Resulting from Today's Technology Choices to Hit Businesses by 2024
Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.
Security Think Tank:
Balanced approach can detangle supply chain complexity
Francesca Williamson shares insight on how you can detangle the complexities of the supply chain and create better security practices.
Three Threats Dirty Data Poses to the Enterprise
Steve Durbin discusses three dirty data cyber security concerns, and how organisations can protect themselves against these emerging threats.