You are viewing 19 of 25 results
Array
research

Leadership Insights: Unlocking the business value of security

Explore the historic business perceptions holding back security, and discover steps security leaders can take to accelerate positive change.

Read more
Array
research

ICS Insights:
Challenging Manufacturers

Has your organisation considered the viable actions to reduce the risks posed if manufacturers are not carefully assessed and managed?

Read more
Array
research

ISF Resources to Establish Confidence In Your Cyber Resilience

Demonstrate that the appropriate measures are being implemented to embed cyber resilience best practice with key ISF resources.

Read more
Array
research

Threat Horizon 2024: The disintegration of trust

Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?

Read more
Array
research

Review and Gap Analysis of Cybersecurity Legislation and Cybercriminality Policies in Eight Countries

The ISF, in conjunction with CC-DRIVER, have released a report detailing new methods to prevent, investigate and mitigate cybercrime.

Read more
Array
research

Legal and Regulatory Implications for Information Security: People's Republic of China

Read the latest ISF research on how the Personal Information Protection Law (PIPL) will affect organisations how CII operators must follow and report on data protection and security procedures.

Read more
Array
research

Cyber Insurance: Is it worth the risk?

The cyber insurance market has sustainably grown in its relatively short history, but also displayed a volatility.

Read more
Array
research

Preparing for the General Data Protection Regulation

The European Union’s General Data Protection Regulation (the GDPR) brings data protection legislation into line…

Read more
Array
research

Securing the Supply Chain: Preventing your suppliers’ vulnerabilities from becoming your own

Sharing information with suppliers is essential for the supply chain to function. However information compromised…

Read more
Array
research

Securing the IoT: Taming the Connected World

The Internet of Things (IoT) has exploded into the connected world and promises much: from…

Read more
Array
research

Industrial Control Systems: Securing the systems that control physical environments

With so many global organisations heavily reliant on Industrial Control Systems (ICS) to support business operations, senior business managers and boards are now encountering growing pressure to improve and maintain the security of their organisations ICS Environments.

Read more
Array
research

Establishing A Business-Focused Security Assurance Programme: Confidence In Controls

How secure is your organisation’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?

Read more
Array
research

Building Tomorrow’s Security Workforce

Business and security leaders today must actively work to build and sustain a robust security workforce, as shortfalls in skills and capability to manage risk can manifest as major security incidents that damage organisational performance, reputation and image.

Read more
Array
research

Data Leakage Prevention (DLP)

The increasing adoption of collaboration platforms, cloud services and social media, which are often accessed using personal devices, has introduced a host of new ways for sensitive data to leak.

Read more