Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Threat Horizon 2022: Digital and physical worlds collide
By 2022, organisations will be plunged into crisis as ruthless attackers exploit technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.Read more
Demystifying Zero Trust
Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.Read more
Review and gap analysis of cybersecurity legislation and cybercriminality policies in eight countries
The ISF, in conjunction with CC-DRIVER, a consortium of 13 partner organisations from industry, research…Read more
The ISF Benchmark
The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.Read more
ISF Aligned Tools Suite 2020
The ISF Aligned Tools Suite 2020 Executive Summary outlines 8 cyber challenges that cybersecurity professionals and organisations are facing.Read more
Standard of Good Practice for Information Security 2020
The goal of every information security professional is to enable the organisation to conduct its…Read more
ISF Rapid Security Assessment
The Rapid Security Assessment (RSA) provides a high impact, peer-validated Information Security Management System (ISMS)…Read more
Protecting the Crown Jewels
Can you be sure that you know exactly where your organisation’s most critical information assets…Find out more
Cyber Security Exercise
ISF Consultancy Cyber Security Exercises immerse your team in realistic, tailored scenarios, testing your organisation’s…Find out more
The New World Order
Steve Durbin kicks off the new season focussing on 'The New World Order and the Race for Tech Dominance'.
Best of 2021
In today's episode, we're sharing a compilation of some of our listeners favourite episodes from…
Emerging Threats for 2022: Q&A
In this episode, we’ll hear the presentation’s Q&A session, in which Steve responds to the audience questions.
Table Top Cyber Simulation Exercise
As a security leader you are considered the front line of defence, so how do you prepare the business, C-suite and security teams to survive an attack and respond effectively?
ISF Annual Threat Update: Emerging Threats for 2022
Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.
Cyber Security Exercise - Finland
Test and prove your ability to respond to a Ransomware / Cyber attack on your…
Ways to survive the ransomware menace
As enterprise clammers to address the ransomware threat of today, what steps should you be…Watch Now
ISF Annual Update: Emerging Threats for 2022
On Wednesday 8 December, 15.00 GMT/10.00 EST, Steve Durbin, Chief Executive, ISF held our annual emerging…Watch Now
Colonial Power - Todays Cybercrime Pandemic and what to do about it
Panelists from the ISF CxO Roundtable - Today's Cybercrime pandemic and what to do about…Read more
The 6 Best Practices to Prevent Ransomware Infection
Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.
Security Think Tank: Reframing CISO-boardroom relations
Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.
"log4j 2" - a perfect way to ruin a security professional's weekend
By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.