Solutions and Insights

Tackle your security challenges with our trusted solutions and valued insights.

Research

(Showing 3 of 10)
Research

Demystifying Zero Trust

Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.

Read more
Research

Securing Containers: Keeping pace with change

Organisational use of Containers has been increasing rapidly, rising from 23% to 92% in a 4-year period.

Read more
Research

Security Architecture: Navigating complexity

Budgetary investments in information security are under renewed scrutiny as organisations struggle to justify even the smallest spend.

Read more

Tools

(Showing 1 of 1)
Tool

Standard of Good Practice for Information Security 2020

The goal of every information security professional is to enable the organisation to conduct its…

Read more

Consultancy Services

(Showing 2 of 2)
Service

Request an ISF Zero Trust Readiness Assessment

The Zero Trust Readiness Assessment (ZTRA) provides an independent, actionable assessment of your organisation's readiness…

Read more
Service

Standard of Good Practice for Information Security

The ISF’s Standard of Good Practice for Information Security 2020 (SOGP 2020) is the most…

Find out more

Podcasts

(Showing 2 of 2)
Podcast

Next-Gen Cyber Security Software Tips for Vendors & CISOs

ISF Chief Executive, Steve Durbin speaks with Mel Shakir, Managing Director of DreamIt Ventures, about his…

published 28 - September - 2021
Listen Now
Podcast

Survive and Profit from Radical Change

Steve Durbin, Chief Executive of the ISF, speaks with Jonathan Brill, futurist and author of…

published 17 - August - 2021
Listen Now

Events

(Showing 3 of 10)

On Demand Events

Event

A Wizards Guide to Security in the Cloud

A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…

Watch on-demand
Event

Cloud Security – a dynamic approach to cloud risk monitoring and reporting

On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…

Watch on-demand
Event

Why a Zero Trust model is driving an Identity Centric Security Strategy

As Organisations continue to adopt and embrace new technology platforms, it also brings with it…

Watch on-demand

Videos

(Showing 1 of 1)
Video

Protecting the Crown Jewels - Todays Cybercrime Pandemic and what to do about it

Understand how to protect your organisation's crown jewels in a quick 6-minute snippet from Today’s…

Watch Now

News

(Showing 3 of 17)
News

Dissecting the true value of SASE is a challenge

As a relatively nascent technology that is getting a lot of publicity, dissecting the true…

published 01 - December - 2021
Read More
News

What are the risks associated with personal, unsanctioned apps on corporate devices and why?

From a security perspective, what are the personal apps/app types that you think CISOs should…

published 24 - August - 2021
Read More
News

Adapting InfoSec for Container Security

Containerization has effectively become the new normal for expediting app delivery and improvements; security concerns…

published 27 - July - 2021
Read More