You are viewing 19 of 25 results
research

Securing Containers: Keeping pace with change

Organisational use of Containers has been increasing rapidly, rising from 23% to 92% in a 4-year period.

Read more
research

Security Architecture: Navigating complexity

Budgetary investments in information security are under renewed scrutiny as organisations struggle to justify even the smallest spend.

Read more
research

Extinction Level Attacks: A survival guide

Extinction Level Attacks details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack.

Read more
research

Threat Horizon 2023: Security at a tipping point

Aimed at CISOs, senior leaders and risk executives, the Threat Horizon 2023 identifies nine future threats to information security grouped within three key theme

Read more
research

Human-Centred Security: Positively influencing security behaviour

Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.

Read more
research

Remote Working and Cyber Risk

As businesses emerge into the new world, beyond their response to the pandemic, we’re likely…

Read more
research

How the ISF Supports You in Securing European Railway Infrastructure

The ISF is committed to continually support businesses to stay cyber resilient and the railway sector is no exception. From our human-centred security research series, to our supply chain suite, we have something to support your needs as an organisation.

Read more
research

Securing your Supply Chain: Risk-based supplier assurance when it’s needed most

The challenge for businesses is that, even with a recognition that supplier management is important to efficient ongoing operations, in too many cases it still lets cyber vulnerabilities in ‘by the back door’.

Read more
research

Continuous Supply Chain Assurance: Monitoring supplier security

Supply chains are often huge, complex and challenging to manage. Large organisations have multiple thousands of suppliers, each of which have their own suppliers. Supplier vulnerabilities are therefore an increasingly common cause of compromise.

Read more
research

Becoming a next-generation CISO

As organisations undergo digital transformation to make themselves more responsive, CISOs are coming under pressure to help these far-reaching changes succeed.

Read more
research

ISF CISO Briefing: Adapting to a New World

As countries implement exit strategies from lockdown, the fallout from COVID-19 has presented a complex set of interrelated factors, causing a ripple effect that impacts the global economy, every geographic region, and all industry sectors.

Read more
research

Securing the Supply Chain: Preventing your suppliers’ vulnerabilities from becoming your own

Sharing information with suppliers is essential for the supply chain to function. However information compromised…

Read more
research

Threat Horizon 2022: Digital and physical worlds collide

By 2022, organisations will be plunged into crisis as ruthless attackers exploit technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastructure.

Read more
research

Securing the IoT: Taming the Connected World

The Internet of Things (IoT) has exploded into the connected world and promises much: from…

Read more
research

Using Cloud Services Securely: Harnessing Core Controls

Cloud computing has evolved at an incredible speed and, in many organisations, has become entwined with the complex technological landscape that supports critical daily operations.

Read more
research

Demystifying Artificial Intelligence in Information Security

Whilst AI poses new information risks, it can also be used for good and should become a key part of every organisation’s defensive arsenal.

Read more
research

Human-Centred Security: Addressing psychological vulnerabilities

Human-centred security starts with understanding humans and their interaction with technologies, controls and data.

Read more
research

Industrial Control Systems: Securing the systems that control physical environments

With so many global organisations heavily reliant on Industrial Control Systems (ICS) to support business operations, senior business managers and boards are now encountering growing pressure to improve and maintain the security of their organisations ICS Environments.

Read more
research

Delivering an Effective Cyber Security Exercise

Performing cyber security exercises can help organisations improve their ability to detect, investigate and respond to cyber attacks in a timely and effective manner.

Read more
research

Threat Horizon 2021: The digital illusion shatters – Full report now available to download

The world is now heavily digitised. Technology enables innovative digital business models and society is…

Read more
research

Threat Intelligence: React and Prepare

The digital revolution presents opportunities to identify and exploit the rising value of information. But this same value also attracts unwanted attention and risks.

Read more
research

Building A Successful SOC: Detect Earlier, Respond Faster

Building a successful Security Operations Centre (SOC) can greatly enhance the ability to detect and disrupt cyber attacks, protecting the business from harm.

Read more
research

Protecting the Crown Jewels: How to Secure Mission-Critical Assets

Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised.

Read more
research

Blockchain and Security: Safety in Numbers

Understanding the potential security risks related to blockchain and how they can be addressed, is vital for any organisation planning to use it as the basis for developing applications.

Read more
research

Engaged Reporting: Fact and fortitude

Now that cyber security has the attention of the board and information risk is on the agenda, CISOs are being asked increasingly tough questions about security investment and risk.

Read more
research

Engaging with The Board: Balancing cyber risk and reward

When boards and CISOs engage successfully, organisations are better able to take advantage of the…

Read more
research

Establishing A Business-Focused Security Assurance Programme: Confidence In Controls

How secure is your organisation’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?

Read more
research

Building Tomorrow’s Security Workforce

Business and security leaders today must actively work to build and sustain a robust security workforce, as shortfalls in skills and capability to manage risk can manifest as major security incidents that damage organisational performance, reputation and image.

Read more
research

Data Leakage Prevention (DLP)

The increasing adoption of collaboration platforms, cloud services and social media, which are often accessed using personal devices, has introduced a host of new ways for sensitive data to leak.

Read more
research

Managing the Insider Threat: Improving Trustworthiness

The insider threat has intensified as people have become increasingly mobile and hyper-connected. Almost every worker has multiple devices that can compromise information instantly and at scale: impact is no longer limited by the amount of paper someone can carry.

Read more
research

Data Privacy in the Cloud: Enabling business agility by managing risk

With cloud-based systems come inherent challenges. These are further complicated as data subject to privacy regulation inevitably moves into the cloud.

Read more