Solutions and Insights

Tackle your security challenges with our trusted solutions and valued insights.

Research

(Showing 3 of 38)
Research

Threat Horizon 2022: Digital and physical worlds collide

By 2022, organisations will be plunged into crisis as ruthless attackers exploit technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.

Read more
Research

Demystifying Zero Trust

Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.

Read more
Research

Review and gap analysis of cybersecurity legislation and cybercriminality policies in eight countries

The ISF, in conjunction with CC-DRIVER, a consortium of 13 partner organisations from industry, research…

Read more

Tools

(Showing 3 of 10)
Tool

The ISF Benchmark

The ISF Benchmark Executive Summary provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.

Read more
Tool

ISF Aligned Tools Suite 2020

The ISF Aligned Tools Suite 2020 Executive Summary outlines 8 cyber challenges that cybersecurity professionals and organisations are facing.

Read more
Tool

Standard of Good Practice for Information Security 2020

The goal of every information security professional is to enable the organisation to conduct its…

Read more

Gain unlimited access to our comprehensive research, reports, and tools

Become a Member today

Consultancy Services

(Showing 3 of 9)
Service

ISF Rapid Security Assessment

The Rapid Security Assessment (RSA) provides a high impact, peer-validated Information Security Management System (ISMS)…

Read more
Service

Protecting the Crown Jewels

Can you be sure that you know exactly where your organisation’s most critical information assets…

Find out more
Service

Cyber Security Exercise

ISF Consultancy Cyber Security Exercises immerse your team in realistic, tailored scenarios, testing your organisation’s…

Find out more

Podcasts

(Showing 3 of 67)
Podcast

The New World Order

Steve Durbin kicks off the new season focussing on 'The New World Order and the Race for Tech Dominance'.

published 20 - January - 2022
Listen Now
Podcast

Best of 2021

In today's episode, we're sharing a compilation of some of our listeners favourite episodes from…

published 11 - January - 2022
Listen Now
Podcast

Emerging Threats for 2022: Q&A

In this episode, we’ll hear the presentation’s Q&A session, in which Steve responds to the audience questions.

published 21 - December - 2021
Listen Now

Events

(Showing 3 of 7)
Event

Table Top Cyber Simulation Exercise

As a security leader you are considered the front line of defence, so how do you prepare the business, C-suite and security teams to survive an attack and respond effectively?

date 26 - January - 2022, 08:30 AM GMT
Venue In person - London
Register Now
Event

ISF Annual Threat Update: Emerging Threats for 2022

Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.

date 26 - January - 2022, 01:00 PM GMT
Venue Online
Register Now
Event

Cyber Security Exercise - Finland

Test and prove your ability to respond to a Ransomware / Cyber attack on your…

date 03 - February - 2022, 08:30 AM EET
Venue In person - Helsinki, Finland
Register Now

Videos

(Showing 3 of 11)
Video

Ways to survive the ransomware menace

As enterprise clammers to address the ransomware threat of today, what steps should you be…

Watch Now
Video

ISF Annual Update: Emerging Threats for 2022

On Wednesday 8 December, 15.00 GMT/10.00 EST, Steve Durbin, Chief Executive, ISF held our annual emerging…

Watch Now
Video

Colonial Power - Todays Cybercrime Pandemic and what to do about it

Panelists from the ISF CxO Roundtable - Today's Cybercrime pandemic and what to do about…

Read more

News

(Showing 3 of 162)
News

The 6 Best Practices to Prevent Ransomware Infection

Read Steve Durbin's latest article addressing the most common ransomware attack techniques whilst offering guidance on their prevention.

published 21 - January - 2022
Read More
News

Security Think Tank: Reframing CISO-boardroom relations

Read Emma Bickerstaffe's latest article for Computer Weekly as she offers CISO's food-for-thought following the pandemic.

published 20 - December - 2021
Read More
News

"log4j 2" - a perfect way to ruin a security professional's weekend

By now Members will be very familiar with the concern around the 'log4j 2' remote code execution vulnerability; Apache's java-based logger library also known as 'Log4Shell'. This vulnerability is filed as CVE-2021-44228 in the NIST National Vulnerability Database.

published 16 - December - 2021
Read More