Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Research

Demystifying Zero Trust
Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.
Read more
Securing Containers: Keeping pace with change
Organisational use of Containers has been increasing rapidly, rising from 23% to 92% in a 4-year period.
Read more
Security Architecture: Navigating complexity
Budgetary investments in information security are under renewed scrutiny as organisations struggle to justify even the smallest spend.
Read moreTools

Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…
Read moreConsultancy Services

Request an ISF Zero Trust Readiness Assessment
The Zero Trust Readiness Assessment (ZTRA) provides an independent, actionable assessment of your organisation's readiness…
Read more
Standard of Good Practice for Information Security
The ISF’s Standard of Good Practice for Information Security 2020 (SOGP 2020) is the most…
Find out morePodcasts

Next-Gen Cyber Security Software Tips for Vendors & CISOs
ISF Chief Executive, Steve Durbin speaks with Mel Shakir, Managing Director of DreamIt Ventures, about his…

Survive and Profit from Radical Change
Steve Durbin, Chief Executive of the ISF, speaks with Jonathan Brill, futurist and author of…
Events
On Demand Events

A Wizards Guide to Security in the Cloud
A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…
Watch on-demand
Cloud Security – a dynamic approach to cloud risk monitoring and reporting
On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…
Watch on-demand
Why a Zero Trust model is driving an Identity Centric Security Strategy
As Organisations continue to adopt and embrace new technology platforms, it also brings with it…
Watch on-demandVideos

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it
Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…
Watch NowNews
Dissecting the true value of SASE is a challenge
As a relatively nascent technology that is getting a lot of publicity, dissecting the true…
What are the risks associated with personal, unsanctioned apps on corporate devices and why?
From a security perspective, what are the personal apps/app types that you think CISOs should…
Adapting InfoSec for Container Security
Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…