Upcoming Events

The Standard of Good Practice: A unified approach to compliance
Discover how the ISF SOGP is supporting leading global organizations in managing compliance across multiple standards and jurisdictions.
On Demand Events

Grey Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

The Rise of the Cloud-Conscious Adversary
Join Mark Moore as he discusses the critical oversights leaving organisations vulnerable, real-world stories of cloud attacks, and provides guidance for defending against cloud-conscious adversaries.

Ireland Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Finland Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Cyber Asset Discovery: From 'nice-to-have' to mission critical
In this webinar, industry experts Peter west and Justin Stouder discuss rising significance and growth of asset discovery and the pivotal role data quality and speed play in decision making.

India Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Orange Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

UK Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Australasia Chapter Spring Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Norway Chapter Autumn Meeting
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Security Culture: Making cybersecurity an active part of your organization
Industry expert Jelle Wieringa about how you can better understand, measure and use your existing security culture to your advantage.

Africa Symposium
Chapter Meetings provide an opportunity for Members in the same geographic region to meet and discuss security and risk management issues.

Shift Left, Shield Right: The role of CWPP in a CNAPP world
From build time to runtime, join SentinelOne as they discuss the complementary roles of agentless and agent-based security layers.

The Perfect Storm: Preparing today for the future state of cloud security
Nachiket Joshi from CrowdStrike explores embracing hybrid cloud environments against the backdrop of a continuously changing attack surface.

Why Women Should Choose Cyber
A panel webinar focussing on supporting and cultivating a community of aspiring female information security professionals.

Using the SOGP and CCM for Multi-Cloud Security
A webinar exploring how the cross reference can help security practitioners deploy effective controls over their multi-cloud environments.

Illuminate the Blind Spots: Why your security investments are failing
Watch as Dawid Kowalski from FireMon explores how to illuminate the blind spots and really protect your perimeter.

Threats to Watch Out For: A CISOs guide to application security
John Stock from Outpost24 provides insight into the most pressing threats in application security and how to effectively mitigate them.

Perspectives on Fighting Back Against Phishing Attacks
A panel explore how stakeholders view the problem of phishing, and provide insight into how we can all start tackling this problem head-on.

ISF Annual Threat Update: Emerging threats for 2023
Chief Executive of the ISF, Steve Durbin, took to the stage once again for our annual Emerging Threats webinar.

Manchester 2022, ISF World Congress
ISF Congress is a Member-only event for global senior executives and business leaders in information, cyber security and risk management.

Managing Risk the ISF Way
Gareth Haken provides insight into how the ISF's wealth of materials can be combined and used to effectively manage risk.

How to Identify and Prioritise Attack Paths and Prevent their Exploitation
Bernard Montel from Tenable outlines the need for organisations to identify critical assets as soon as possible to reduce the risk of attack.

The Future CISO: Securing the digital organisation of tomorrow
Where do CISOs find themselves today, and what changes should they be looking at to ensure their role continues to add value?

Keeping Pace with Cybersecurity by Scaling IT Governance and Data Risk Management
Jorge Ferrer Raventos from OneTrust discusses how to reinforce your IT risk program in a 'not if, but when' incident environment.

Threat Intelligence: An evolving capability
How can you better understand the threats your organisation faces, and make well-informed decisions about how to address them?

The Modern Approach to Fight Phishing
As threats gain in volume, Justin Pemberton explains how you can protect your business by deploying a modern approach to email security.

Supply Chain Cyber Security - Industry Specific Insights
Dan Vasile provides a BlueVoyant perspective on what can be done to better protect organisations and their supply chains.

Collaborating to Shift Away from Shadow OT
Paul Holland offers author's insight into the ISF research on ICS, and how you can understand and protect these often-critical environments.

Cyber Security Showcase Week 2022
A series of thought-provoking webinars addressing current business challenges with new and unique insight.

Cyber for All: Why cyber is for everyone
Steve Dobson explores how cyber threats manifest themselves today, how the ISF can help, and how we can all reduce the risk of cyber attack.

Countering Supply Chain Attacks: Where next?
Elli Tsiala from ABN AMRO discusses defending against cyber threats that take advantage of large, complex and fast-changing supply chains.

Cyber Security Ratings Are a Thing, What Do I Do Now?
SecurityScorecard offer an approach to ensuring a vendor's security posture is sufficient to prevent attacks and ensure information security.

Strengthen Your Security Culture: A CISOs perspective
A panel session discussing improving security behaviour and culture, featuring industry insight from experienced security professionals.

Innovating Defence: The life of a Risk Operations Centre (ROC) Analyst
Darin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.

The Future CISO: Securing the digital organisation of the future
Former CISO Paul Watts reflects on where CISOs find themselves today, and how they can ensure their role continues to add value.

Preparing for a Cyber Crisis: The ISF approach
Daniel Norman details how you can design realistic, impactful cyber attack simulations and playbooks to strengthen your cyber resilience.

Optimising Third-Party Risk
Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.

Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases
Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.

Implementing a Zero Trust Strategy: The ISF approach
Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.

Cloud Native Security: The runtime security imperative
Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.

Extending the SOC: What's Next in Security
Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.

Top 5 Board Level Concerns for Zero Trust
Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.

The Role of Information Security in Mergers and Acquisitions
Watch as Richard Absalom discusses considering security requirements during highly sensitive, fast-moving merger and acquisition activity.

Detailing the Major Structural Changes in ISO27002:2022
Gareth Haken presents the key changes to the new ISO/IEC 27002:2022 release, and how the ISF Standard of Good Practice has been aligned.

Taking a Holistic View of Cybercrime: ISF and European Commission report
Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.

Living in the New Normal: Which are the Main Threats for 2022?
Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.

Managing Cyber Risk Across your Extended Vendor Ecosystem
Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.

Mitigating Ransomware Attacks
Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.

ISF Annual Threat Update: Emerging Threats for 2022
Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…

Ways to survive the ransomware menace
Ransomware continues to be a clear and present danger for all organisations - as long…

ISF Annual Threat Update Emerging Threats for 2022
Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.

The ultimate guide: Reduce risk with your software security initiative
The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…

Trusted Third-Party Risk Management
Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…

How to stop Phishing Threats for Office 365
With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right…

5G Security Standardisation and Knowledge Base
As Mobile Network Operators (MNOs) around the globe introduce and launch 5G systems, communications networks…

Human-Centred Security: Effectively managing behaviour
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

The Challenges of Multi-Cloud and Hybrid Security
On Thursday September 30 at 18:00 BST, Benoit Heynderickx, Principal Analyst at the ISF will…

How do you monitor your cloud controls in a multi-cloud environment?
On Thursday 16th September at 13:00 BST, Benoit Heynderickx Principal Analyst at the ISF will…

Threat Horizon: Emerging Cyber Risks for APAC
On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

Ransomware in Focus
Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…

A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk
The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.

Resistance is futile: Embracing the age of the cyber weapon
Andy Jones, Distinguished Analyst at the ISF, spoke at the Special 5th Anniversary of the…

Secure Access Management: Modernise your IT Infrastructure by Maximising Productivity and Minimising Friction
On Thursday 17th June, 15:00 BST, Paul Holland, Principal Research Analyst at the ISF spoke…

2021 Threat Trends: Ransomware
On Thursday 17th June, 10:00 BST, Benoit Heynderickx, Principal Analyst at the ISF took part…

Why Zero Trust Starts with Identity Security
Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.

North American Threat Horizon Workshop Series: ISF Predicts 2023 – Building Resiliency
The ISF is hosting a bespoke series of events for C-Suite/Senior Executive’s in the North American Finance, Pharma & Healthcare sector based on our recently released ISF report, Threat Horizon 2023: Security at a tipping point.

Today’s cybercrime pandemic and what to do about it
From 1pm BST, Steve Durbin, Chief Executive at the ISF will be joined by expert speakers to share their insights on the techniques cyber criminals are using to increase the effectiveness of their criminal activity.

Extinction Level Attacks: Surviving Ransomware and Nation States
Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.

What is your SASE architecture missing?
ISF and Netskope are holding an exclusive virtual event on Thursday 6th May from 12.30 – 13.30 BST where we’ll be guiding you through an online SASE assessment.

Ransomware: It really is everywhere
This discussion set the scene of the dangers of ransomware; exploring the current trends, shifts in behaviour, criminal groups, who is being targeted, why ransomware leverages fear and how you can protect your organisation.
Watch on-demand
Managing Supply Chain Risk the ISF Way
The ISF recently hosted a panel discussion with guests from Nokia and Skanska AB…

Change Automation: Turning Network Security Alerts into Action
You use multiple network security controls in your organization, but chances are, they’re not talking…
Watch on-demand
Why a Zero Trust model is driving an Identity Centric Security Strategy
As Organisations continue to adopt and embrace new technology platforms, it also brings with it…
Watch on-demand
ISF Predicts 2023: Building resilience for an uncertain future
Hear from Steve Durbin, Chief Executive of the ISF, as he explores the key topics of our Threat Horizon 2023 report.
Watch on-demand
Managing Operational Risk in a Downturn
During these unprecedented times, a large number of organisations had to shift their business operations…

Cloud Security – a dynamic approach to cloud risk monitoring and reporting
On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…
Watch on-demand
Managing Information Risk: Insurance Industry Roundtable
Catch up on our recent roundtable event where our expert panel discussed how European insurance…
Watch on-demand
Continuous Supply Chain Assurance: Always know your risk
It is impossible to operate a business without having a supply chain. In the increasingly…
Watch on-demand
Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware
Ransomware is on the rise—there's no doubt about that. On Thursday 18th February, 14:00 GMT/15:00…
Watch on-demand
Positively Influencing Security Behaviour: Human-Centred Security
Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.
Watch on-demand
Why 5G security standards are so important and what is the latest progress?
5G promises many new capabilities and use cases, making this technology the coming preferred platform for the digitalized world. That is why security and resilience of our telco networks will become even more critical in the future.
Watch on-demand
Human-Centred Security: Managing the insider threat
The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally…
Watch on-demand
A Wizards Guide to Security in the Cloud
A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…
Watch on-demand
Emerging Cyber Threats for 2021
Organisations have been thrust into chaos, and the role of the Security Officer and security function is about to come under increasing pressure with a number of previously unanticipated scenarios and threats over the coming months.
Watch on-demand
Assess. Comply. Assure: Eight Cyber Challenges in an Uncertain World
Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…

ISF: Managing Human risk in times of uncertainty
For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…
Watch on-demand
CxO webinar series: Managing information risk from critical suppliers
Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…
Watch on-demand
BSIMM11: Here’s What’s New!
The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives…
Watch on-demand
CxO Webinar Series: Digital transformation in the Oil & Gas industry for the modern cyber security landscape
Catch up on our recent CxO webinar where the ISF were joined by industry experts…
Watch on-demand
Subnet Masks Required: How Covid-19 is changing the cyber security landscape
Covid-19 has forced many companies to work remote which has increased their risk surface. On…
Watch on-demand
CxO webinar series: Recovery – Cyber Insurance: Making sure you are covered & bouncing back
Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…
Watch on-demand
CxO Webinar Series: Containment – The Ultimate Incident Response Exercise: Are you remotely ready?
This session explores how organisations are being forced to deal with the new and often unplanned, reality of remote working.
Watch on-demand
CxO webinar series: Detection & Analysis – Stories from the front lines
Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…
Watch on-demand
CxO webinar series: Preparation – Communicating in a Cyber Crisis
Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…
Watch on-demand
CxO webinar series: Cyber Resiliency – Reaping the Benefits
Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…
Listen on-demand
Legal and Regulatory Implications for Information Security
Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative…
Watch on-demand