Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research

Threat Horizon 2024: The disintegration of trust
Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?
Read more
Demystifying Zero Trust
Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.
Read more
Securing Containers: Keeping pace with change
Organisational use of Containers has been increasing rapidly, rising from 23% to 92% in a 4-year period.
Read moreTools

Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…
Read moreServices

Threat Horizon Planning Exercise
The Threat Horizon Planning Exercise provides an actionable, tailored plan to help business leaders and…
Find out more
Request an ISF Zero Trust Readiness Assessment
An independent, actionable assessment of your organisation's readiness for implementing zero trust - in just 10 days.
Learn more
Policy and Standards support
The ISF’s Standard of Good Practice for Information Security is the most comprehensive information security…
Find out morePodcasts

Next-Gen Cyber Security Software Tips for Vendors & CISOs
ISF Chief Executive, Steve Durbin speaks with Mel Shakir, Managing Director of DreamIt Ventures, about his…

Survive and Profit from Radical Change
Steve Durbin, Chief Executive of the ISF, speaks with Jonathan Brill, futurist and author of…
Events
On Demand Events

Cloud Native Security: The runtime security imperative
Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.

Extending the SOC: What's Next in Security
Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.

CSO Security Summit UK
Discussing overall cybersecurity with a focus on cloud, three speakers from the ISF presented at the CSO Security Summit UK 2022.
Videos

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it
Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…
Watch NowNews
Three Cyber Threats Resulting from Today's Technology Choices to Hit Businesses by 2024
Steve Durbin features in Dark Reading to discuss three major cyber threats that could result from today's hasty technology decisions.
Dissecting the true value of SASE is a challenge
As a relatively nascent technology that is getting a lot of publicity, dissecting the true…
What are the risks associated with personal, unsanctioned apps on corporate devices and why?
From a security perspective, what are the personal apps/app types that you think CISOs should…