Research
![Array](https://www.securityforum.org/wp-content/uploads/2022/10/Threat-Intelligence_Member-Launch-Graphics_PWS-Carousel-Image-300x197.png)
Threat Intelligence:
React and prepare
Get to the core of what threat intelligence is and demonstrate the value it can provide if effectively managed.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2022/09/MicrosoftTeams-image-6-scaled-e1663060889660-300x288.jpg)
Cyber Awareness: Think before you click!
Download tried and tested ISF resources to help you raise awareness and improve your security best practice.
Download now![Array](https://www.securityforum.org/wp-content/uploads/2022/05/ISF_TH2024_Launch-Graphics_PWS-Library-Tile-300x174.png)
Threat Horizon 2024: The disintegration of trust
Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?
Read more![Array](https://www.securityforum.org/wp-content/uploads/2022/03/Rehearsing-Your-Cyber-Incident-Response-Capability-During-Periods-of-Instability_Carousel-Image-1600x1050-1-300x197.png)
Rehearsing Your Cyber Incident Response Capability
Six Proactive Steps Towards Stabilisation
Read more![Array](https://www.securityforum.org/wp-content/uploads/2022/03/Managing-Cyber-Threats_assets_Carousel-Image-1600x1050-1-300x197.png)
Managing Cyber Threats During Periods of Instability
Seven Proactive Steps Towards Stabilisation
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/TH2022_Blog_600x338-300x170.jpg)
Threat Horizon 2022: Digital and physical worlds collide
Threat Horizon 2022 presents nine potential threats across three themes driven by global events and major developments.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/11/ISF_Demystifying-Zero-Trust_PLaunch-Graphics_ISFL-Calendar-Event-Tile-300x216.png)
Demystifying Zero Trust
Zero trust continues to cause confusion across industries. Many vendors sell it as an off-the-shelf solution, but in reality, its successful implementation requires organisations to embark on a larger change programme.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/10/Extinction-Level-Events_PWS-thumbnail-2.0-300x158.png)
Understanding the ransomware menace
The average cost to recover from a ransomware attack is $1.85 million. No sector is…
Download Now![Array](https://www.securityforum.org/wp-content/uploads/2021/09/ISF_Cyber-Insurance_Member-Launch-Graphics_ISFL-Topic-Image-listing-View-Tile-300x300.png)
Cyber Insurance: Is it worth the risk?
The cyber insurance market has sustainably grown in its relatively short history, but also displayed a volatility.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Extinction-Level-Attacks_Member-Launch_PWS_Library-Tile_912x526-300x173.png)
Extinction Level Attacks: A survival guide
Extinction Level Attacks details an approach that can help an organisation to be better prepared, and ultimately survive an extinction level attack.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Threat-Horizon-2023_ES_PWS_Library-Tile_912x526-300x173.png)
Threat Horizon 2023: Security at a tipping point
Aimed at CISOs, senior leaders and risk executives, the Threat Horizon 2023 identifies nine future threats to information security grouped within three key theme
Download now![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Remote-Working_PWS-Tile-300x174.png)
Remote Working and Cyber Risk
As businesses emerge into the new world, beyond their response to the pandemic, we’re likely…
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/CSCA-public-launch_PWS-Tile-300x173.png)
Continuous Supply Chain Assurance: Monitoring supplier security
Suppliers help to keep operations moving for all organisations, but this also brings information risk that you must keep a watchful eye on.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/05/2020_Becoming a Next Gen CISO Image-min-1024x558-300x163.jpg)
Becoming a next-generation CISO
As organisations undergo digital transformation to make themselves more responsive, CISOs are coming under pressure to help these far-reaching changes succeed.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/05/CISO-Briefing-2_PWS_Library-Tile-300x173.png)
ISF CISO Briefing: Adapting to a New World
As countries implement exit strategies from lockdown, the fallout from COVID-19 has presented a complex set of interrelated factors, causing a ripple effect that impacts the global economy, every geographic region, and all industry sectors.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Cloud_Security_LibraryThumb_912x526px-1-300x173.png)
Using Cloud Services Securely: Harnessing Core Controls
Cloud computing has evolved at an incredible speed and, in many organisations, has become entwined with the complex technological landscape that supports critical daily operations.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Human-Centred-Security-2_Blog_600x338-1-300x169.png)
Human-Centred Security: Addressing psychological vulnerabilities
Human-centred security starts with understanding humans and their interaction with technologies, controls and data.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Fotolia_194376126_XXL-300x204.jpg)
Delivering an Effective Cyber Security Exercise
Performing cyber security exercises can help organisations improve their ability to detect, investigate and respond to cyber attacks in a timely and effective manner.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/05/TH2021-min-300x263.jpg)
Threat Horizon 2021: The digital illusion shatters – Full report now available to download
The world is now heavily digitised. Technology enables innovative digital business models and society is…
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/SOC_PWS_launch_LibraryThumb_912x526px-300x173.png)
Building A Successful SOC: Detect Earlier, Respond Faster
Building a successful Security Operations Centre (SOC) can greatly enhance the ability to detect and disrupt cyber attacks, protecting the business from harm.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Protecting-the-Crown-Jewels-300x200.jpg)
Protecting the Crown Jewels: How to Secure Mission-Critical Assets
Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/DLP_thumb-912px-300x173.jpg)
Data Leakage Prevention (DLP)
The increasing adoption of collaboration platforms, cloud services and social media, which are often accessed using personal devices, has introduced a host of new ways for sensitive data to leak.
Read more![Array](https://www.securityforum.org/wp-content/uploads/2021/04/Podcast_Human-Centered-Security33-1-300x225.png)
Managing the Insider Threat: Improving Trustworthiness
The insider threat has intensified as people have become increasingly mobile and hyper-connected. Almost every worker has multiple devices that can compromise information instantly and at scale: impact is no longer limited by the amount of paper someone can carry.
Read more