Manchester 2022, ISF World Congress
ISF World Congress is a Members-only event for global senior executives and business leaders in information, cyber security and risk management.
On Demand Events
Optimising Third-Party Risk
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.
Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.
Implementing a Zero Trust Strategy: The ISF approach
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.
Cloud Native Security: The runtime security imperative
Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.
Extending the SOC: What's Next in Security
Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.
Top 5 Board Level Concerns for Zero Trust
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.
CSO Security Summit UK
Discussing overall cybersecurity with a focus on cloud, three speakers from the ISF presented at the CSO Security Summit UK 2022.
The Role of Information Security in Mergers and Acquisitions
Watch as Richard Absalom discusses considering security requirements during highly sensitive, fast-moving merger and acquisition activity.
Detailing the Major Structural Changes in ISO27002:2022
Gareth Haken presents the key changes to the new ISO/IEC 27002:2022 release, and how the upcoming ISF SOGP 2022 has been aligned.
Taking a Holistic View of Cybercrime: ISF and European Commission report
Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.
Living in the New Normal: Which are the Main Threats for 2022?
Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.
Managing Cyber Risk Across your Extended Vendor Ecosystem
Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.
Mitigating Ransomware Attacks
Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.
ISF Annual Threat Update: Emerging Threats for 2022
Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…
Ways to survive the ransomware menace
Ransomware continues to be a clear and present danger for all organisations - as long…
ISF Annual Threat Update Emerging Threats for 2022
Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.
The ultimate guide: Reduce risk with your software security initiative
The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…
Trusted Third-Party Risk Management
Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…
How to stop Phishing Threats for Office 365
With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right…
5G Security Standardisation and Knowledge Base
As Mobile Network Operators (MNOs) around the globe introduce and launch 5G systems, communications networks…
Human-Centred Security: Effectively managing behaviour
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
The Challenges of Multi-Cloud and Hybrid Security
On Thursday September 30 at 18:00 BST, Benoit Heynderickx, Principal Analyst at the ISF will…
How do you monitor your cloud controls in a multi-cloud environment?
On Thursday 16th September at 13:00 BST, Benoit Heynderickx Principal Analyst at the ISF will…
Threat Horizon: Emerging Cyber Risks for APAC
On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…
Ransomware in Focus
Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…
A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk
The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.
Resistance is futile: Embracing the age of the cyber weapon
Andy Jones, Distinguished Analyst at the ISF, spoke at the Special 5th Anniversary of the…
Secure Access Management: Modernise your IT Infrastructure by Maximising Productivity and Minimising Friction
On Thursday 17th June, 15:00 BST, Paul Holland, Principal Research Analyst at the ISF spoke…
2021 Threat Trends: Ransomware
On Thursday 17th June, 10:00 BST, Benoit Heynderickx, Principal Analyst at the ISF took part…
Why Zero Trust Starts with Identity Security
Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.
North American Threat Horizon Workshop Series: ISF Predicts 2023 – Building Resiliency
The ISF is hosting a bespoke series of events for C-Suite/Senior Executive’s in the North American Finance, Pharma & Healthcare sector based on our recently released ISF report, Threat Horizon 2023: Security at a tipping point.
Today’s cybercrime pandemic and what to do about it
From 1pm BST, Steve Durbin, Chief Executive at the ISF will be joined by expert speakers to share their insights on the techniques cyber criminals are using to increase the effectiveness of their criminal activity.
Extinction Level Attacks: Surviving Ransomware and Nation States
Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.
What is your SASE architecture missing?
ISF and Netskope are holding an exclusive virtual event on Thursday 6th May from 12.30 – 13.30 BST where we’ll be guiding you through an online SASE assessment.
Ransomware: It really is everywhere
This discussion set the scene of the dangers of ransomware; exploring the current trends, shifts in behaviour, criminal groups, who is being targeted, why ransomware leverages fear and how you can protect your organisation.Watch on-demand
Managing Supply Chain Risk the ISF Way
The ISF recently hosted a panel discussion with guests from Nokia and Skanska AB…
Change Automation: Turning Network Security Alerts into Action
You use multiple network security controls in your organization, but chances are, they’re not talking…Watch on-demand
Why a Zero Trust model is driving an Identity Centric Security Strategy
As Organisations continue to adopt and embrace new technology platforms, it also brings with it…Watch on-demand
ISF Predicts 2023: Building resilience for an uncertain future
Hear from Steve Durbin, Chief Executive of the ISF, as he explores the key topics of our Threat Horizon 2023 report.Watch on-demand
Managing Operational Risk in a Downturn
During these unprecedented times, a large number of organisations had to shift their business operations…
Cloud Security – a dynamic approach to cloud risk monitoring and reporting
On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…Watch on-demand
Managing Information Risk: Insurance Industry Roundtable
Catch up on our recent roundtable event where our expert panel discussed how European insurance…Watch on-demand
Continuous Supply Chain Assurance: Always know your risk
It is impossible to operate a business without having a supply chain. In the increasingly…Watch on-demand
Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware
Ransomware is on the rise—there's no doubt about that. On Thursday 18th February, 14:00 GMT/15:00…Watch on-demand
Positively Influencing Security Behaviour: Human-Centred Security
Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.Watch on-demand
Why 5G security standards are so important and what is the latest progress?
5G promises many new capabilities and use cases, making this technology the coming preferred platform for the digitalized world. That is why security and resilience of our telco networks will become even more critical in the future.Watch on-demand
Human-Centred Security: Managing the insider threat
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally…Watch on-demand
A Wizards Guide to Security in the Cloud
A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…Watch on-demand
Emerging Cyber Threats for 2021
Organisations have been thrust into chaos, and the role of the Security Officer and security function is about to come under increasing pressure with a number of previously unanticipated scenarios and threats over the coming months.Watch on-demand
Assess. Comply. Assure: Eight Cyber Challenges in an Uncertain World
Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…
ISF: Managing Human risk in times of uncertainty
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…Watch on-demand
CxO webinar series: Managing information risk from critical suppliers
Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…Watch on-demand
BSIMM11: Here’s What’s New!
The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives…Watch on-demand
CxO Webinar Series: Digital transformation in the Oil & Gas industry for the modern cyber security landscape
Catch up on our recent CxO webinar where the ISF were joined by industry experts…Watch on-demand
Subnet Masks Required: How Covid-19 is changing the cyber security landscape
Covid-19 has forced many companies to work remote which has increased their risk surface. On…Watch on-demand
CxO webinar series: Recovery – Cyber Insurance: Making sure you are covered & bouncing back
Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…Watch on-demand
CxO webinar series: Containment – The Ultimate Incident Response Exercise: Are you remotely ready?
Cyber Resiliency in a defining moment in history Containment – The Ultimate Incident Response Exercise: Are…Watch on-demand
CxO webinar series: Detection & Analysis – Stories from the front lines
Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…Watch on-demand
CxO webinar series: Preparation – Communicating in a Cyber Crisis
Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…Watch on-demand
CxO webinar series: Cyber Resiliency – Reaping the Benefits
Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…Listen on-demand
Legal and Regulatory Implications for Information Security
Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative…Watch on-demand