Upcoming Events

Innovating Defence: The life of a Risk Operations Centre (ROC) analyst
Darlin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.

Manchester 2022, ISF World Congress
ISF World Congress is a Members-only event for global senior executives and business leaders in information, cyber security and risk management.
On Demand Events

Optimising Third-Party Risk
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.

Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.

Implementing a Zero Trust Strategy: The ISF approach
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.

Top 5 Board Level Concerns for Zero Trust
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.

Taking a Holistic View of Cybercrime: ISF and European Commission report
Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.

Living in the New Normal: Which are the Main Threats for 2022?
Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.

Managing Cyber Risk Across your Extended Vendor Ecosystem
Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.

Mitigating Ransomware Attacks
Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…

Ways to survive the ransomware menace
Ransomware continues to be a clear and present danger for all organisations - as long…

ISF Annual Threat Update Emerging Threats for 2022
Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.

The ultimate guide: Reduce risk with your software security initiative
The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…

Trusted Third-Party Risk Management
Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…

Human-Centred Security: Effectively managing behaviour
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

Threat Horizon: Emerging Cyber Risks for APAC
On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

Ransomware in Focus
Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…

A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk
The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.

Why Zero Trust Starts with Identity Security
Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.

Extinction Level Attacks: Surviving Ransomware and Nation States
Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.

Managing Information Risk: Insurance Industry Roundtable
Catch up on our recent roundtable event where our expert panel discussed how European insurance…
Watch on-demand
Continuous Supply Chain Assurance: Always know your risk
It is impossible to operate a business without having a supply chain. In the increasingly…
Watch on-demand
Assess. Comply. Assure: Eight Cyber Challenges in an Uncertain World
Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…

ISF: Managing Human risk in times of uncertainty
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…
Watch on-demand
CxO webinar series: Managing information risk from critical suppliers
Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…
Watch on-demand
CxO Webinar Series: Digital transformation in the Oil & Gas industry for the modern cyber security landscape
Catch up on our recent CxO webinar where the ISF were joined by industry experts…
Watch on-demand
Subnet Masks Required: How Covid-19 is changing the cyber security landscape
Covid-19 has forced many companies to work remote which has increased their risk surface. On…
Watch on-demand
CxO webinar series: Recovery – Cyber Insurance: Making sure you are covered & bouncing back
Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…
Watch on-demand
CxO Webinar Series: Containment – The Ultimate Incident Response Exercise: Are you remotely ready?
This session explores how organisations are being forced to deal with the new and often unplanned, reality of remote working.
Watch on-demand
CxO webinar series: Cyber Resiliency – Reaping the Benefits
Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…
Listen on-demand