Mark Ward
Mark has also provided guidance on the emergence of next-generation CISOs and is currently investigating how to make information security governance more engaged and effective. Before joining the ISF, Mark…
Mark has also provided guidance on the emergence of next-generation CISOs and is currently investigating how to make information security governance more engaged and effective. Before joining the ISF, Mark…
…cope are debated by Paul Watts, Richard Absalom and Mark Ward in this threat-themed podcast. Paul shares his formative experiences from the last big crisis he weathered – the 2008…
…Brook and Mark Ward to explain the power scenarios have in helping security practitioners see beyond present problems and plot a path to a future that benefits everyone in the…
Security practitioners and business leaders often seem like a community divided by a common language. Former historian Jemina Lakka-Kolari joins ISF analysts Paul Watts and Mark Ward to explore the…
Expanding upon many of the themes addressed in his book ‘Rethinking InfoSec’, Greg van der Gaast, CISO at Scoutbee, joins ISF Senior Analyst, Mark Ward, for another instalment of the…
…plugged. Raj Samani, Chief Scientist at Rapid7 joins ISF Analysts Lee Munson and Mark Ward to debate the best way security leaders and their teams can prioritise patching. What…
…Highways, and cyber security veteran, delves into the many ways to hire and oversee InfoSec professionals alongside Distinguished Analyst Paul Watts and Senior Analyst, Mark Ward from the ISF. …We…
…older cohort. ISF researchers and analysts Arunoshi Singh, Scott Binning and Ayesha Sayyad educate Mark Ward on living with social media. Detailing the digital detox and the connections they maintain…
ISF Analysts Paul Watts and Mark Ward expand upon the fallout of the pandemic on cyber with Monica Verma, CISO at the Norwegian Directorate of Health. Monica and the panel…
…of Threat Horizon. Listen as ISF Analysts Max Brook, Richard Absalom and Mark Ward debate how the uncertainties and changes born from these trends will shape the near future. …I…
All infosec teams have been under huge pressure lately and good CISOs acknowledge that and look for ways to help staff handle the stress Mark Ward, Senior Research Analyst at…
…to Mark Ward and Paul Watts, how he developed an epic tale of King Infosecios and his three daughters Peoplia, Processia and Technia, to illustrate the concept of people, processes,…
…or a troubling development for information security and the wider business, is debated by technology and security expert Yngvar Ugland with ISF research analysts Lee Munson, Mark Ward and ISF…
…Paul Watts and Mark Ward talk about their favourite books on cyber security principles, data privacy and cross-cultural management. … Unfortunately, a lot of that data is easily hackable, and…
…Mark Ward, Senior Research Analyst at the ISF The coronavirus pandemic has seen a dramatic increase in cyber crime. Research from cybersecurity firm Checkpoint shows there were an estimated 200,000…
ISF Principals Bharat Thakrar and Mark Chaplin join Mark Ward to begin a series dedicated to shedding light on a career in information security. The conversation covers their personal paths…
A strategic tool that security teams across the globe are using to improve cyber security. By assessing security performance across a range of different environments, the ISF Benchmark enables organisations…
Experience an exclusive session from the ISF World Congress in Rotterdam where Mark Ward assembled an accomplished panel of experts to dissect the past, present and future role of the…
Mark is an accomplished risk management professional with more than 30 years of experience in multiple disciplines, including risk governance and assurance, business resilience, security standards and oversight, compliance management,…
…talk to ISF analysts Paul Watts and Mark Ward about the lessons he learned and how he applies them. “ … the academic route into our industry is not the…
…the organisational context such as artists and creators? Musician, performer and broadcaster LJ Rich explores the promise and peril of AI tech tools alongside ISF analysts Paul Watts and Mark…
…with ISF analysts Paul Watts and Mark Ward. Together, they dive into a comprehensive discussion examining the report on the breach at the British Library in the UK. Listen as…
ISF Analysts Mark Ward, Paul Watts and Richard Absalom highlight the four key themes underpinning the recent release of Threat Horizon 2024: The disintegration of trust. The second in a…
This Analyst Insight podcast sees ISF Analysts Max Brook, Mark Ward and Paul Watts discuss the background to this year’s Threat Horizon 2024: The disintegration of trust report. The first…
ISF Analysts and authors of the latest Threat Horizon 2024: The disintegration of trust report, Mark Ward and Max Brook, speak with James Chappell from security firm, Digital Shadows, to…
…job entails at beginner, intermediate and expert levels. ISF Principal Bharat Thakrar and Analyst Mark Ward put the questions to the trio in this second of a series exploring infosec…
This Analyst Insight podcast sees ISF Analysts Richard Absalom, Mark Ward and Max Brook continue breaking down this year’s Threat Horizon 2024: The disintegration of trust report released to Members…
…Burns-Peake and experienced former CISO Paul Watts, engage in a discussion on strategies for establishing a favorable early reputation and fostering constructive relationships rather than risking alienation. Mark Ward serves…
ISF Analysts Paul Watts, Max Brook, Lee Munson and Mark Ward further expand upon the latest ISF Threat Intelligence: React and prepare report to talk everything ‘threats’. The panel break…
…– Patricia Rodrigues alongside ISF analysts Paul Watts and Mark Ward talks about how she uses it and debates what its ultimate impact will be. It’s a tool, it doesn’t…
…Max Brook and Mark Ward are joined by AI expert David Sully from Advai to explore how the use of AI is likely to shape the future of our professional…
Director of Cyber Security Governance at Danone, Lies Alderlieste, joins ISF Analysts Mark Ward and Paul Watts to provide counsel for security leaders embarking on a governance journey. Lies and…
…studying computer science. Providing his first-hand perspective is Benoît de Lavignère, one of the program’s first successful recruits. The conversation culminates with insightful questions from Richard Absalom and Mark Ward…
…and doing this starts with a robust security framework, creating a structure that enables effective measurement of the programme. Using a security healthcheck or ISF Benchmark can allow the security…
…use AI. Policy experts and AI wranglers, Steve Dorward and Verona Johnstone-Hulse, joined ISF analysts Lee Munson and Mark Ward to take a look at the ever-growing roster of regulations…
…Year in Information Technology 2018/19 award. Votes were cast by approximately 89,000 online subscribers. Durbin is a global business leader, a Chartered Marketer and a Fellow of the Chartered Institute…
Amanda Hallett and Karan Randhawa from Maersk offer industry insight into how they use the Threat Horizon report in their internal threat monitoring systems – providing great context to the…
Whilst AI models have circulated academic settings for years, their recent surge in popularity have ignited a crucial discussion about their future. Listen as Ellie Pavlick, professor at Brown University…
When boards and CISOs engage successfully, organisations are better able to take advantage of the opportunities presented by cyberspace and today’s information technology while addressing the associated risk. The full…
Information security professionals are facing increasingly complex threats—some new, others familiar but evolving. By 2021, the world will be significantly digitised and connected. Competing in the digital marketplace will become…
Drive cost-effectiveness and propel your business forward with insight from 200 leading global organisations. We’ve partnered with Winmark to bring you a powerful new C-suite department benchmarking report that equips…
…Year in Information Technology 2018/19 award. Votes were cast by approximately 89,000 online subscribers. Durbin is a global business leader, a Chartered Marketer and a Fellow of the Chartered Institute…
…Principal Research Analyst Richard Absalom joins Senior Analyst and podcast host Mark Ward to discuss in detail what’s changing with ISF Research. Richard and Mark outline what Members can expect…
https://www.youtube.com/watch?v=Us0exCM1jg0 Following a turbulent two years, former-CISO and Distinguished Analyst at the ISF, Paul Watts, and Mark Ward, Senior Research Analyst at the ISF, are considering key recommendations for…
ISF Senior Analysts Mark Ward and Emma Bickerstaffe in conversation with Simon Meech, Cyber Practice Lead at insurance broker BMS Group. The incessant onslaught of ransomware attacks presents challenges for…
…actors. This panel session features ISF Analyst, Mark Ward in conversation with: Peter West – Assistant Head Defensive Cyber Organisation at UK Ministry of Defence, with 20 years’ experience across…
Our next Denmark Chapter Autumn Meeting will be held on Wednesday 25 September 2024. These meetings provide ISF Members with the unique opportunity to engage with local security professionals in…
Our next Denmark Chapter Spring Meeting will be held on Thursday 13 March 2025 Held in English, these meetings provide ISF Members with the unique opportunity to engage with local…
Our next Denmark Chapter Spring Meeting will be held on Thursday 14 March 2024. These meetings provide ISF Members with the unique opportunity to engage with local security professionals and…
…economies such as Kenya, India, Brazil and Indonesia also called out as markets of interest to the UK. As the UK chases a Brexit dividend to open up non-EU markets…
…the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he…
…of Dear Infosec, ISF’s Mark Ward and Paul Watts, discuss the pivotal events and formative experiences that have shaped the life and career of Petri Koivisto, a seasoned security leader…
…Paul Ducklin, security podcaster Alice Violet and ISF analysts Lee Munson and Mark Ward debate if anything has changed or we are stuck in the same cycle of risks and…
…impact it has had since its creation. ISF Distinguished Analyst, Paul Watts and ISF Senior Analyst, and Dear Infosec podcast host, Mark Ward test his responses. …One of the compromises…
…as with all risk, some risks can be positive, and some can be negative. Predicting a market shift and pivoting to exploit that position was a risk-based decision that paid…
…being a CISO? Security leader Erhan Temurkan joins ISF analysts Paul Watts and Mark Ward to dissect his journey from BISO to CISO and unpack what he saw along the…
…Dear InfoSec host Mark Ward. Matt shares further insight into the set-up of a Computer Emergency Response Team and the issues associated with running the centre. He also shares his…
…Said School, and ISF analyst Mark Ward examine the role of Australia’s internet overseer and explore how the internet might change, along with who stands to gain or lose. …
…Tanner debates the difference between the two, and when an organisation should go hunting for each one with ISF analysts Paul Watts and Mark Ward. …As you start…
…session with ISF Senior Research Analyst, Mark Ward, as he and other security professionals explore the global society’s influence on rising cyber security challenges. Closing Panel: The Power of Community…
Perhaps the biggest change that CISOs need to accept is that hybrid working is how it will be from now on. There’s no going back. Mark Ward, ISF Senior Analyst…
Five Proactive Steps Towards Stabilisation In an increasingly interconnected, data‑driven world, any period of destabilisation has the potential to cause unforeseen consequences to organisations wherever they may reside or operate….
…episode of the re-branded podcast, host Mark Ward, along with Paul Watts; ISF Members Iwona Muchin and Erhan Temurkan, delve into problems submitted by listeners. They debate how technical is…
…Analyst and podcast host Mark Ward, along with ISF Principal Consultant Bharat Thakrar, to discuss auditing. Together, they delve into the role, its responsibilities, misconceptions about auditors, potential future developments,…
Just what does a BISO do all day, and how much does it differ to that of a CISO? ISF Distinguished Analyst Paul Watts and ISF Analyst Mark Ward try…
Looking ahead to 2024, the ISF research team sit down to reveal what themes they will be looking into over the next 12 months. Listen as Mark Ward, Richard Absalom,…
…the rise of the next-generation CISO, a security professional who is adapting to the new environment, mastering new skills and advancing the discipline of information security. Written by Mark Ward,…
…better job rather than expose them, and their employer, to unknown or unforeseen risks. Mark Ward is a Senior Research Analyst at the ISF and has written papers on future…
Scammers, cyber-thieves and computer criminals are not far behind pornographers when it comes to exploiting technology innovations for their own purposes. Every time technology takes a leap forward, enterprising hackers…
…Kapil Raina, a cybersecurity marketing executive of 20+ years, has built and led product, marketing, sales, and strategy teams at startups and large brands such as VeriSign, VMware, and Zscaler….
Do your security controls measure up? Gain a comprehensive view of how ISF can support you in reviewing performance against your industry peers and industry frameworks with this four minute…
Professor of Information Systems at the London School of Economics, Jannis Kallinikos, joined ISF Chief Executive Steve Durbin to challenge the traditional view of data as merely statistics. From reshaping…
…been studied at length by psychologists and used in advertising, sales, marketing and other sectors. But the impact of cognitive biases in cybersecurity is often neglected or isn’t studied in…
…do with the marketing of a product, which is driven by suppliers competing against their market rivals in a saturated industry, as it is to do with the range of…
…that mean? The reality is that we live in an increasingly interconnected digital world that we do not completely understand, nor truly control. In parallel, we have seen a marked…
…teams, everybody, on security. Not just by saying no, but how can I help you to get better? How can I help the company to move forward whilst maintaining security?……
…security industry, he graduated with a degree in French and studied for his Chartered Institute of Marketing qualifications before moving into the working world. What was your route into the…
…at the board and C-suite level, and the hallmark of successful change programmes everywhere is having champions and consistent messaging at that level. Put together, all of the actions recommended…
…cyber security in the boardroom, effective risk management post pandemic, human-centred security and the ISF’s trademark, forward looking threat assessment, Threat Horizon 2023. This year’s event included thought provoking and…
…be the first in the market, and the absence of global security governance. The need for security by design is well understood. “Today, we are able to discover, assess, quantify…
Today marks the 50th episode of the Analyst Insights podcast! This milestone episode celebrates the positives of working in InfoSec. Drawing on testimonies from previous guests, Patric Versteeg and Mike…
In this episode, ISF Chief Executive, Steve Durbin speaks with Mark Ralls, President and COO of Invicti Security – a Texas-based company that provides dynamic web application security solutions. They…
…Luit and Mark Chaplin explore the business resilience landscape since COVID-19, examine what has changed and highlight the cyber risk consequences for organisations already dealing with uncertainty from multiple directions….
…and accessibility requirements when attending events, to resolve complaints, to market events and promotions, to inform on new services and to aid and improve the user experience when accessing this…
…relating to your rights, please contact us by using the details set out in the “Contact” section below. You can also unsubscribe from any direct marketing by clicking on the…
…Marketing and Advertising sector: Organisations will begin utilising the data from sensors and cameras to create tailored content around marketing and advertising products. Behavioural analytics will create ‘data doubles’ as…
…under that duvet!)? The cyber insurance market was worth approximately $7bn in 2020. This is expected to triple to more than $20bn by 2025. Despite the projected growth, the market…
…strategy not only as a major element of competition in high-tech markets but also as a strategic challenge to US global leadership. In this context, the US trade war against…
Here are five questions to help determine if your company needs cyber coverage. The cyber insurance market is rapidly maturing and there are many reasons for this. Companies are increasingly…
…enables you to navigate the intricacies of the market and complexities of a cyber insurance policy by: Clarifying the type of financial losses covered by cyber insurance Outlining key considerations…
…observability platform. The cyber insurance market is growing, and has the potential to grow substantially. German reinsurance giant Munich Re said in September 2018 that it would grow to $8…
…matter of time before this national framework became an international benchmark. Thus, the updates to the CSF acknowledge this new reality, where the CSF 2.0 has outgrown its original purpose….
…with one active user account, in case a department head requests the need to use them.” – CISO. Even legacy systems can vary, with many security professionals highlighting a marked…
…meeting the needs of Chief Information Security Officers and other business leaders. Examples include: Engaging with the Board: Balancing cyber risk and reward Information Security Strategy: Transitioning from alignment to…
…forward. In many, if not all cases, extreme cyber attacks are a perfect opportunity for organisations to secure future budget for resilience and recovery-based initiatives, such as overhauling legacy systems…
…cyberspace is possible going forward. I think privacy by design will become more important when we go to the development of AI, because at a certain moment, the insecurity of…
…newly emerging landscape required swift innovation and forward-thinking organizations seized the opportunity to reevaluate infrastructure and policy. With the dust settling, it’s time to turn our eyes toward the year…
…a different way to look at vulnerabilities (also known as a vulnerability reward program (VRP)). Many large multi-national corporations already operate these programmes (e.g. Apple, Google, Facebook and Uber). A…
…made aware of the consequences of their actions. Legislation must also encourage victims to come forward and explore avenues of legal remedy. Cybercrime offenses have a low conviction rate, which…
…These organizations view it as a growth driver, a key to innovation, and a competitive advantage. (Roman and medieval shields, after all, were used for defense and for pushing forward…
…remote-work shift for security teams going forward. A Mobile-Focused Security Policy is a Must As workers went home, mobile devices became more ascendant, with many of the new go-to collaboration…
Erik Avakian, a former US State CISO, joins ISF CEO Steve Durbin to discuss the ever-evolving role of CISOs, emphasising their need to be business partners rather than just gatekeepers….
…to look at vulnerabilities (also known as a vulnerability reward program (VRP)). Many large multi-national corporations already operate these programmes (e.g. Apple, Google, Facebook and Uber). A bug bounty is…
…that human-centered security is the way forward. The idea starts with a simple premise, and one backed up by empirical evidence; human beings tend to be the weak link in…
…of global players in the information technology market, “digital control” over the lives of citizens becomes total, actively invading the jurisdictions of nation states around the world. In 2021, the…
…an independent oversight board for Meta and former Prime Minister of Denmark, explores how to balance online regulation and freedom, and shares insight into the crucial role of leadership in…
…is a key access point in the cloud Human error drives cloud risk A versatile IT Professional of 18 years, Mark has excelled in network redesign, server migration and…
…an expanding market opportunity for IoT devices, which can be split into two categories: consumer and industrial IoT. Consumer IoT Consumer IoT products often focus on convenience or adding value…
…what we’re about is breaking the rules.” That, in a nutshell, is the drone problem: an explosive (potentially literally) new market with virtually no governance beyond ‘exclusion zone’ rules —…
…traditional entertainment and gaming markets into areas such as retail, manufacturing, engineering and healthcare. Attackers will perform man-in-the-middle attacks on AR-enabled devices and infrastructure, gaining access to intimate and sensitive…
…poor marks. While the action was not unexpected, the landmark nature of the outlook should provide some needed emphasis to both boards of directors and CISOs of the modern business…
…collaboration, to resolve complaints, to market events and promotions, to inform you on new products and services, to aid and improve the user experience when accessing events and participating in…
…shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where…
With all the hype in marketing, some topics get way too much attention, while other — in some cases, more important — topics languish because they’re not as sexy or…
…cyber insurance market of $20 billion by 2025. Combine this with industry analysts observing low ‘loss ratios’ for cyber insurance, and what emerges is a seemingly healthy and highly profitable…
…with significant investment in the UK, US and Chinese markets. The estimated global market value for AR technologies is set to grow from $4 billion in 2017 to $60 billion…
…(ISF.org) finds a thriving marketplace on the Dark Web full of wannabe criminals. Products and services start as low as $300 simply to have an individual hacked. A young adult…
In a world filled with unpredictability and chaos, relying on conventional methods will not prepare organisations for an uncertain future. Against this backdrop, Threat Horizon is changing. Listen as ISF…
…for, among others, Caesar’s Palace, Lego, Omega, Vera Bradley, and Yamaha. Bob shares his perspective on digital transformation in the retail market, building a solid team, and effective communication within…
In 2023, the ISF research team will focus on: exploring the future via scenarios, leadership, securing industrial control systems, and building a tool to help Members measure key information security…
Having explored the staggering potential of AI in business, the focus now shifts to questioning whether its potential will be leveraged for beneficial or detrimental purposes. Rob MacGregor, a threat…
…sales and marketing, and support them in acquiring some of the security skills we seek? The truth is that it’s very difficult to train somebody in the softer, emotionally intelligent…
…Practice for Information Security 2020 (SOGP 2020), the ISF Benchmark, the ISF Information Risk Assessment Methodology 2 (IRAM2) and the ISF’s research programme. Identify. Assess. Protect Designed to be as…
…new technologies, the geopolitical arena is likely to become complex, turbulent and fragile. More inward-facing policies will be a result of frustration with liberalism and globalism, while national and commercial…
…toward illicit data manipulation to compromise the accuracy and credibility of information, thus puncturing the integrity of the data organizations use to drive their businesses forward. 2. Misleading signals will…
Rocio de la Cruz from BPE Solicitors provides a legal perspective on cybercrime and policy as ISF Analysts explore the ISF’s involvement in CC-Driver. The panel delve into the European…
…CISO 360 Middle East: Opportunity to connect with CISOs and business leaders from the Middle East and beyond to learn, network, and benchmark effective leadership strategies Benefit from a unique…
…expecting to see positive results. As life gradually returns to normal, what can businesses take forward from this period of upheaval? We must see this situation as an opportunity to…
How could your organisation be affected during periods of instability, and what steps could you take to understand the potential threats and be better prepared? The Information Security Forum has…
The global cyber security profession is facing a universal challenge in attracting talented individuals. Lisa Hartmann-Jensen from the City of Copenhagen’s administrative office explores how leveraging local colleges is winning…
Following the recent release of the updated ISF Threat Intelligence: React and prepare report to Members, ISF Analysts sat down to offer their unique experience and insight into the current…
Iwona Muchin from ISF Member Ageas joins the analysts behind the recent ISF Measuring Security and Nurturing Security Governance reports, to provide her unique perspective into what it takes to…
We hope you enjoyed tuning in to our Summer Listening programme over the last few weeks. As we enter Season 22, we thought we would take a moment to reflect…
…that the cybersecurity workforce needs to increase 62 percent in the U.S. market, ISC(2) said. Trouble Spots The fundamental causes for the skill gap are myriad, starting with a lack…
…whose companies have a vision that shapes the conceptual landscape of their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting…
…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….
“Criminals have become more sophisticated by considering the psychological aspects of an attack,” says Mark Chaplin, principal at the Information Security Forum. Fraudsters are taking advantage of the global COVID-19…
…a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role of the Board in Cybersecurity….
…their respective industries. Steve is a Chartered Marketer, a Fellow of the Chartered Institute of Marketing and a visiting lecturer at Henley Business School where he speaks on the role…
By 2021, the world will be significantly digitized and connected. Competing in the digital marketplace will become increasingly difficult, as businesses develop new strategies which challenge existing regulatory frameworks and…
Valuable information is used to compete and succeed in a global market; information assets can represent more than 80% of an organisation’s total value. Mission-critical information assets – an organisation’s…
…the CISO Alignment with business strategy (e.g. reporting in the context of the organisation’s main focus areas, such as major business projects, global operations, new markets or product and service…
…to the forefront, businesses are at an increased risk of losing both their revenue and reputation. According to Deloitte, a negative trust-related event can erode an enterprise’s market cap by…
…Act (DPA) would create a consumer watchdog to give Americans control and protection of their data, promote a competitive digital marketplace, and prepare the U.S. for the digital age. Introduced…
…of averages mean that there are high-level similarities between individuals banded together in these generations… Historically, marketers, branding experts and politicians have analysed the trends and preferences exhibited by individuals…
…about it here. Mark Chaplin is an experienced information risk management professional with approximately 30 years of experience in the technology and information security industry. He specialises information security governance…
<Back to Blocks and Templates…
…of big tech companies. As these companies grow stronger through diverse revenue streams and enhanced investment power, they may create barriers to entry in the global digital marketplace that will…
…example, a deepfake video of Ukrainian president Volodymyr Zelensky, urging Ukrainians to lay down arms was broadcast on Ukrainian TV. Stock markets A threat actor wants to make a quick…
…market as manufacturers look to make money from this newer capability. Quotes from Paul Holland, ISF Principal Research Analyst In April 2020, the FCC voted to open 6 GHz for…
…and NIST as well as peer and industry sector groupings. Why work with ISF to run your Security Assessment and Review? Based on the unique ISF Benchmark, the ISF Security…
…management (IRAM2), control assessments (Benchmark), and managing supply chain risk (Supplier Security). This webinar will include: An introduction to each of the ISF Tools An overview of the new topics…
…and cross-reference aids, including a rebuilt Benchmark platform and the new IRAM2 WebApp. Aligned to the latest version of the Standard of Good Practice for Information Security 2020 (SOGP 2020),…
…same time) or entanglement (qubits become interlinked), enabling them to perform more complex calculations efficiently and simultaneously. Believe it or not, quantum computing is already here and its market is…
…every stage of development. Comprehensive cloud security is no longer about shifting left. It’s about starting left–and going all the way to the right. Join Ziad Ghalleb, Product Marketing…
…from the ISF Benchmark and major external developments including new legislation and other requirements, The Standard is business-friendly and used by many global organizations as their primary reference for information…
…Dice. “It has accelerated and concentrated forces, such as the move to remote working and adoption of cloud services, that were already in motion. Moving forward in 2021, organizations must…
…a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking companies must plan to mitigate the potential risks now. Steve Durbin, ISF CEO…
…users to download software as a precursor to being able to use one’s website or online services – even if it’s security software – introduce more risk than reward? “In…
An interview with Steve Durbin, Chief Executive of the Information Security Forum (ISF) In response to evolving cyber threats, the Information Security Forum (ISF) offers award-winning consultancy services, training, certifications,…
…looks like – including any financial or other reward for confirmed vulnerabilities disclosed through the programme. There is no particular standard for defining your approach to RD or even how…
…be reported to and where they should forward the message, they can just click that button right in the email and it will be investigated. The physical environment can also…
…that an amount of loss (usually financial) will be incurred. The most straightforward way to measure risk is to take an annual period, count the number of information security incidents…
…to consider moving forward: Bring the federal government together. Think of the federal government as a patchwork quilt, it’s made up of lots of different fiefdoms. It’s quite a challenge…
…forward. About our speakers Steve Durbin, Chief Executive, ISF Steve Durbin is the Chief Executive of the Information Security Forum (ISF). His main areas of focus include strategy, information technology,…
…these cuts will be temporary and that forward-thinking organizations know that security can’t be slashed at a time when adversaries are finding more and more ways into enterprise networks. If…
…liabilities are in sharp focus here, and if the CISO is to be personally liable going forward, what does this really mean for the role? Thirdly, what are the implications…
…and PwC, he has had a technology-forward approach from day one having been at various points in his career an expert and evangelist of 5G, OT, IoT, and AI cybersecurity….
…in cybersecurity incidents. This trend has real implications for the way we manage both our people and our critical assets going forward. Working in a much more distributed and, therefore,…
…to prepare for, and anticipate, future threats to their business operations such as the one observed recently. Complementing this are our award-winning consultancy services, available to Members and non-Members alike,…
Our award-winning consultancy services provide organisations globally with tailored, pragmatic support, translating technical insight into clear business-focused guidance, helping organisations to achieve their information security goals. Available to ISF Member…
…protections needed to ward off the kinds of organized, sophisticated and widespread attacks that have crippled public- and private-sector systems in recent years. Defense Department, the Central Intelligence Agency and…
…in that it is the only annual report that looks forward two years to predict the threat landscape whilst rigorously reviewing the past three years of predictions. In this way…
…team will bring the CISO significant reward when it comes to managing cyber risk. Here are five steps to get started. Engage with the CRO to understand approaches taken for…
…not about the reward. It’s about the recognition…babies cry for it and grown men die for it. That’s what recognition is… Tune in to hear Steve and Christy talk about:…
…it must be protected and secured going forward. These are the types of conversations that CSOs and CISOs are having about the risks their organizations face in a permanent work-from-home…
…procurement processes. Still, old systems will continue to pose problems. “We’re in a better place going forward than we ever were, but we’re having to deal with legacy,” he adds….
…to merge, allowing global criminal networks to expand, and cybercrime becoming an increasing issue for law enforcement and politicians. In this interview, Misha Glenny, award-winning writer, broadcaster and author of…
…will enter the workplace, introducing new information security concerns to organizations. Their attitudes toward sharing information will fall short of the requirements for good information security. Reckless attitudes to sharing…
…greatest reward. Determine Approach Armed with objectives, it’s time to drill down into the current state of your existing architecture and projects. Analyze and document the core characteristics and components….
…and it no longer provides the required protection, as many organizations have discovered. Going forward, organizations must extend risk management to include risk resilience, in order to manage, respond and…
…making the corporate network more like an Internet of Sieves. The humble printer is here to stay, and the magic of paper and the printed word should be reward enough….
…benefit. As companies look to reduce costs, AI is fast becoming more attractive as a replacement for people. It will bring benefits and it will improve with experience, but forward-thinking…
…Inc., said the company has a straightforward process for revoking credentials when an employee leaves. But when employees transfer internally, the security team must manually review their credentials and determine…
…These are questions CISOs must help answer. Risk is a business decision and not a security decision — while it’s the CISO that initiates the risk and reward discussion, it’s…
…According to ISACA’s 2022 State of Cybersecurity Report, social engineering is the predominant cyberattack method accounting for 13% of incidents; the trajectory is upward.[4] Additionally, social engineering attacks are growing…
…of the next-generation CISO, however, they stand out as key differentiators of forward-looking professionals. The six differentiating characteristics include: Balancing Opportunity with Risk Demonstrating Leadership Managing Incidents and Crises Finding…
…at every step of the way. Anyway, what does 2019 is looking forward to with regards to digital dangers? Let’s discuss the five dominant big data and cloud security concerns…
…a tendency to share items when they are outlandish and sensational. Misinformation spreads quickly, producing a fragmented world—a noticeable shift away from collective nationalism and toward favoring a range of…
…entry for security leaders,” he said. “There are CISOs coming into the industry and into these leadership roles without a massive technical background.” Watts foresees a shift toward decentralized security…
…of technology as a means to drive their business forward without debating or discussing the “what happens when it goes wrong” question. Ransomware attacks on hospitals can result in delayed…
…around AI and cybersecurity In Demystifying Artificial Intelligence in Information Security, the ISF’s latest digest, the organization hopes to shed light on AI’s risk and reward for cybersecurity. The conversation,…
…it takes, which is what happens with conventional penetration testing. This encourages the hackers to delve deep and discover something – the more critical the vulnerability, the bigger the reward.…
…Forum. “Moving forward, end users should receive ample security awareness, education and training on the threat of ransomware, particularly its delivery mechanism,” Norman said in an emailed statement. “Typically, the…
…expertise. In response to this, the ISF provides award-winning consultancy services, training and certifications and professional support activities that supplement the implementation of ISF research and tools, to all Member…
…a list of suggested actions to aid you in formulating a forward-looking cyber resilience strategy. The event will be run under the Chatham House rules. Meet our sponsor OpenText is…
…a veritable Who’s Who of government, business, and technology, including some of the world’s most technically sophisticated organizations. Moving forward, organizations of all sizes need to prepare to be targeted…
…resources that have supported them on their journey, and the industry advancements they are most looking forward to seeing play out in the future. …I think Mentorship is hugely…
How forward-looking is your cyber security strategy? ISF’s Strategic Threat Analysis is a short-turnaround, high-impact engagement to review and sharpen your cyber security roadmap and create a board-ready outcome to…
…brought in the wake of former CIA subcontractor Edward Snowden’s revelations that the NSA was running a covert program that spied and collected data on U.S. citizens. In today’s decision,…
…the Information Security Forum (ISF). “By 2021 the world will be heavily digitized,” says Steve Durbin, Managing Director, ISF. The top cyber security concern moving forward, he says, is “technology…
…collective course. (3:50) 2. Staying vocal as a leader. (6:05) 3. Whether something goes to plan or not, an autopsy of the scenario can be a helpful way forward. (10:06)…
…pressure to transform as quickly as possible. However, uncontrolled and rapid transformation can increase both business risk and potential reward. Security and business leaders have become disengaged at a critical…
…Service Architecture (SASE) as the only way forward. It’s likely that you’ve already implemented components and principles of this new architecture into your environment, and your security strategy is more…
…services will be restored, as cloud providers scramble to prioritise customer recovery. Further consolidation of the cloud services market will create a small number of distinct targets that underpin a…
…both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach to security and resilience will be crucial as a hybrid threat…
…security workforce, organizations should adapt to market demands by seeking candidates with diverse competencies and skill sets coupled with providing competitive benefits and structured career development. For some these changes…
Panelists from the ISF CxO Roundtable – Today’s Cybercrime pandemic and what to do about it discuss the recent colonial pipeline, the negative impact of OT, and the decision of…
As we close out 2024, a year marked by unprecedented change and disruption across the world, the question arises: are we set to see more disruption in 2025? With increasing…
…consequences could dramatically reduce the share price, erode market value and expose the business to a number of class action suits or federal and regulatory investigations. How can information security…
…aim to provide participants with the latest information on security trends and developments. Mark your calendar now for the upcoming Summit, scheduled to take place on 23-24 October 2024. …
…and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately managed, it will fast become a major security concern…
…six years at Manhattan Associate’s as a Design Lead where he collaborated with customers and R&D directors to identify market trends and opportunities for efficiency gains within clients distribution centers…
Hear 3 key takeaways from Today’s cybercrime pandemic and what to do about it – CxO Roundtable. Understand what organisations can do to prevent themselves from attacks, how CISOs can…
…security posture is sufficient to prevent cyber attacks and ensure information security. Watch as SecurityScorecard’s Josh Fazio, Sr. Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, dive into…
…from the digital world have an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The…
…Businesses are pouring billions of dollars in AI and automation, and the Industrial IoT (IIoT) alone is set to become a $500 billion market by 2025. IT/OT convergence could spell…
…markets, promote political agendas or gain competitive advantage. Severe reputational damage will be caused when executives or high-profile individuals have their identities compromised. Organizations and individuals will face a new…
…Mark Chaplin, ISF Principal, will provide insights from many of Cyber Simulation Exercises he and his team run for leading organisations in the ISF Membership. You will learn about best…
…years of experience in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA for KnowBe4, he helps organizations of all sizes understand why…
…competitors and destroy corporate reputations. Fraudsters will manipulate financial markets by releasing exploits at opportune moments. A lack of regulation will lead to a culture of digital vigilantism whereby vulnerability…
…reflect the latest findings from the ISF’s research program, input from global ISF member organizations, trends from the ISF Benchmark and major external developments including new legislation and other requirements,…
…and tools overload the market, potential employees have come to recognize information security and compliance as deeply technical, leaving recruiters struggling to identify and appeal to candidates with a less…
Alex works across the ISF Tools portfolio to ensure that deliverables provide maximum value to Members. He has previously led the ISF’s software development activities for the ISF Benchmark, was…
…can support their teams throughout this unprecedented period of change; the difference between good leadership and great leadership; and more. This episode marks the beginning of our podcast’s fifth year…
…welcome, there are nevertheless caveats. The cybersecurity workforce is a huge and diverse market, and the in-demand skill set is constantly changing. We don’t know where the 700,000 additional staff…
…borders in our market – goods move freely, people move freely, money moves freely. Well, that means our systems are interconnected…if you have one country that is the weak link,…
…suffer from using them. 10. Variation We change these terms from time to time and you must check them for changes because they are binding on you. 11. Trademark ISF…
…influential trends that mark this evolution. A Lot More Nation-State Activity To gain a tactical advantage over their opponents, almost every country has historically engaged in some form of intelligence…
…and KRIs help answer and this is why practitioners must be laser-focused on KPIs and KRIs to benchmark their security performance, preparedness, and effectiveness. How can security teams measure cyber…
…respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF | James Tamblin, UK President, BlueVoyant | Steven Moran, Head of Information Security Governance,…
…weak controls at technology providers could allow hackers into their own systems. Regulators are also concerned that a cyberattack that takes down a major financial company could destabilize markets. Questionnaires,…
…in product features, new markets, or improving the customer experience. When organizations look to trim costs, security is too often the target. That’s because security does not easily lend itself…
…THE SPEAKER Francesca is an analyst in the tools and methodologies team, and is the product owner for the Benchmark and the Supplier Security tool, which are the ISF’s security…
…rarely get their data back in full. It’s not that these companies don’t receive the decryption keys after paying because, after all, ransomware groups need to sustain their market reputation…
…transformations within organisations must be carefully planned, especially if the organisation is competing in the highly innovative markets. Whilst there are big opportunities with such a gamble, there are big…
…contextualized to specific role requirements. For example, a senior executive will not experience the same threats as a marketing manager, so why should they both have to complete the same…
Based on our interviews with more than 4,000 cybersecurity professionals from 13 markets across Europe, our report includes new findings on security preparedness and outcomes, revealing how organizations are coping…
…equipment made by companies in China that have strong ties to that country’s government and the military. The questionable equipment includes Lenovo computers, Lexmark printers and GoPro security cameras. While…
…detection and response (EDR) marketplace – there are some amazing products out there. And if you aren’t rocking a security operations centre (SOC), I recommend a managed solution (MDR) if…
When technologies and markets are still in their infancy, it is difficult to predict how they will evolve and what the implications might be. The recent fundamental shift in AI…
The discussion at this month’s Infosecurity Europe panel on quantum computing, artificial intelligence and blockchain highlighted how there is often a stark contrast between the technical view and business view…
…products. “The market for ‘ransomware-as-a-service’ has boomed over the last few years,” Norman told TechRepublic. “Anyone with access to the Dark Web can buy readily available ransomware kits for less…
…improved by using marketing techniques that have been well established over the years. The security team can use visual and audio content such as jingles, slogans, phrases and music to…
…their thoughts and ideas, turned out to be great insight that allowed me to then put together a plan…because they knew the market best, of things that could be different……
…security strategy is one that seriously considers the organization’s unique challenges, risks and resources, including its support for the overall business strategy—such as expanding to new markets, introducing new products…
…increase speed to market for new ideas, he explained. OSS is often seen as being insecure and unsupported. As these negative connotations continue to taint its reputation, some organizations officially…
…systems and technologies, both existing and new, a key focus. This must then filter down from the top into day-to-day business functions such as Human Resources (HR) and marketing. Not…
…consent, with attackers targeting and compromising poorly secured systems and databases at will. Impacts will be felt across industries such as retail, gaming, marketing, and insurance that are already dependent…
…significant impact on not only domestic but also global economic practices. Markets will have a reactionary response to the volatility and uncertainty driven by protectionist policies and practices. The weaponisation…
…of respondents to the ISF Benchmark stated that they do not subject critical systems under development to cyber attack simulations or exercises. This may be because cybersecurity exercises are perceived…
…for IoT devices made and used across the US and Europe. The widespread proliferation of the IoT across a growing number of industry and consumer markets means that, if inappropriately…
Nordic countries boast some of the strongest cyber security defences in the world. Yet their location makes them a prime target for threat actors. Our Members across Sweden, Denmark and…
…and marketing legal, regulatory and contractual compliance. Emphasise the importance of representing all aspects of the organisation Agree on areas of the business for which they require specific or increased…
…an impact on the physical. Invasive technologies will be adopted across both industrial and consumer markets, creating an increasingly turbulent and unpredictable security environment. The requirement for a flexible approach…
…that the Giant Group attack may lead some other umbrella company firms to reassess their own security posture, contracting market stakeholders hope the incident might prompt the UK government to…
…for near-instantaneous connectivity and reduced latency will invigorate to edge computing technologies, architectures and solutions. The desire for edge computing could see its market value grow to $28 billion by…
…outset. However, with a significant number of IoT devices already in circulation, connected and on the market, users have a real responsibility to proactively protect their devices and the information…
…unprepared workforce. At the same time, natural forces will wreak havoc on infrastructure. Invasive technologies will be embraced across both industry and consumer markets, creating an increasingly tumultuous and unpredictable…
…sixteen years as a security executive and CISO in several industry sectors including financial services, retail, critical national infrastructure, food and beverage, data analytics and market research. A certified information…
…Director at investment bank, LD&A, now Drake Star, and Associate Director at Gartner, in the Market and Business Strategy practice for the vendor community. Jean-Michel developed a taste for security,…
…this clearly presents a challenge for a new entrant. “That being said, those that are able to sufficiently differentiate themselves through smart marketing interactions that demonstrate value to the target…
…of data. Is there a negative outlook for businesses in the cybersecurity industry, despite the optimism of market predictions? Steve Durbin, managing director of the Information Security Forum disagreed, saying…
…ethically-based, digital play on the use of data to deliver quantifiable and immediate value to CISOs of all size companies. This will include both internally focused and market driven data.”…
…first woman to be promoted to this position in over three centuries of the company’s history. She is known for leading the global insurance and reinsurance market for five years,…
The coronavirus pandemic is creating a lucrative market for facial recognition manufacturers. But privacy issues need to be top of mind, tech experts warn. In the midst of the ongoing…
…It’s about adapting security around the macro cyber security environment and where the markets are taking us from an economic and trade standpoint. How can organisations tackle these cyber security…
…great leader: Always try to improve. A hunger to further your knowledge and understand everything in your business is the hallmark of a good leader. Strive to listen when there’s…
…labor market push up wages. This was the view of a panel of chief information security officers, speaking at Infosecurity Europe. But there are steps that organizations can take to…
…for marketing purposes. Personal data we collect via cookies Cookies capture your computer’s unique online electronic identifier; this is known as an IP address. Your IP address is considered to…
…Unrealistic expectations and complacency can lead to disaster. Lack of Understanding Automated cybersecurity is a competitive space. The SOAR market is growing fast and expected to reach $1.3 billion by…
…to a recent analysis released by Risk Based Security. The high-water mark for data breaches remains 2017, but there’s only a 3.2 percent difference in total incidents between that year…
As 2023 draws to a close and 2024 looms ahead, we find ourselves grappling with a landscape marked by economic recession, societal unrest, and intensifying geopolitical strife. In the face…
How can organisations best use unified threat management tools to help stem the tide of data breaches? Navigating the plethora of security products on the market to select the right…
…Director – Technical Marketing of NG-SIEM & XDR at CrowdStrike, will share and explore: Mid-year review of 2024 IT and Security key trends and predictions The evolution of the SOC…
…to reinforcing and measuring your InfoSec risk program. In this session, Jorge highlights some of the latest market insights from InfoSec leaders, peers, and industry analysts, examining the driving factors…
…for being too expensive, costing industry more than £6.6bn a year, according to a report. The report is based on a market snapshot survey of 400 UK businesses of various…
…successfully walk this tightrope will not only have a clear competitive advantage but also propel themselves to be on a path to becoming market-leading enterprises. Read the full article here…
This landmark study provides private- and public-sector leaders with evidence-based insights into the cybersecurity practices and investments that are most effective for mitigating risks. ThoughtLab, a leading global research firm,…
Are the recent data breaches finally a catalyst for change in how cyber risk is managed? There was a great deal of discussion, towards the end of 2018, regarding the…
…the board, security practitioners, vendors and authorities will play in helping enterprise prepare, respond and resume their operations should the worst happen. Speakers: Mark Chaplin, Principal at the ISF |…
…in business development, sales, management and marketing. In his current role as Security Awareness Advocate for EMEA at KnowBe4, he helps organisations of all sizes understand why more emphasis is…
…check them for changes because they are binding on you. Trademark ISF and Information Security Forum are UK Registered trademarks Applicable law The English courts have the only right to…
…conversation with: David Thornewill – Group CISO at DHL Marc Gibson – Owner and CEO of DThree Technologies Alexander Seger – Head of Cybercrime at the Council of Europe Mark…
…can automatically transform the buyer into a zero-trust organization. Even though there are several products on the market that certainly claim to do so, no single product in isolation can…
…He is Director of Systems Engineering where he is responsible for overseeing the EMEA go-to-market systems engineering team. Michael is an accomplished public speaker, regularly speaking at conferences and webinars….
…benchmark before investing in a programme, then they fail to understand why they cannot demonstrate a return on investment or the impact the programme is having on behaviour. For example,…
…can be valued according to one of the three following approaches: the future revenue that could be generated from it, the value similar data has in an active market and…
The Information Security Forum is committed to ensuring digital accessibility for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards. Measures…
…on your browsing activities for marketing purposes. Personal data we collect via cookies Cookies capture your computer’s unique online electronic identifier; this is known as an IP address. Your IP…
…rapidly identify and build new routes, form fresh partnerships, and ensure a steady flow of product in the face of major fluctuations in demand. While some markets have dwindled with…
…the 2020 Information Security Standard of Good Practice, to be shortly followed by our new Benchmark. We have also started research on Supply Chain Continuous Assurance, Addressing Extinction Level Events…