Solutions and Insights
Tackle your security challenges with our trusted solutions and valued insights.
Has your organisation considered the viable actions to reduce the risks posed if manufacturers are not carefully assessed and managed?Read more
Embedding Security into Agile Development: Ten principles for rapid improvement
Agile software development methods are proving a better match for today's demanding business environments than…Read more
Information Risk Assessment Methodology 2 (IRAM2)
A simple, practical, yet rigorous approach to risk assessments, enabling organisations to speak a common language with key stakeholders.Read more
Benchmark against peers to identify core areas of security that require attention and maximise return on investment.Read more
Standard of Good Practice for Information Security
An internationally recognised set of good practice covering all aspects of cyber resilience, cloud security and information risk management.Read more
Risk Practitioner Training
A high-impact learning programme to inspire the next generation of information security practitioners and leaders at your organisation.GET IN TOUCH
The Power of Inclusive Leadership
Former Prime Minister of Denmark Helle Thorning-Schmidt explores the responsibility of leaders to uphold the trust that people place in them.
The Great CISO Debate
Experience an exclusive session from the ISF World Congress in Rotterdam where an accomplished panel of experts dissect the role of the CISO.
Security Professionals Aren't on Public Boards: What's holding them back?
Dr. Andrea Matwyshyn explores the robust conversations needed to get CISOs onto boards and improve the international harmonisation of cyber.
How well do you know your attack surface?
With more than 20% of all interactive intrusions associated with the exploitation of public-facing applications,…
CSO Security Summit UK
Explore the novel approaches and innovative technologies your CISO and security peers are taking to future-proof their security strategies.
Supply Chain Cyber Simulation Exercise - New York
Immerse yourself in a simulated cyber attack scenario in the supply chain of a fictitious organization alongside ISF experts.
Takeaways From the Security Middle East Conference 2023
Daniel Norman highlights his key takeaways from the Security Middle East Conference; exploring what the future holds for cyber in the region.Watch now
Benchmark in Bitesize
Gain a comprehensive view of how ISF can support you in reviewing performance against your industry peers and industry frameworks.Watch now
Hack on Japanese Port Shows How Compromised Operational Technology Can Have a Widespread Impact
Paul Holland shares his thoughts on protecting and securing the integrity and confidentiality of information within OT environments.
How organizations can navigate geopolitical and cyber risks in an interconnected world
Globalization and hyperconnectivity has made the world more interconnected and interdependent than ever before. The…
Walking the Tightrope: Navigating the risks and rewards of AI
Steve Durbin contributes to InformationWeek to chart the course for the responsible use of artificial intelligence.