Research
ISF Resources to Establish Confidence In Your Cyber Resilience
Demonstrate that the appropriate measures are being implemented to embed cyber resilience best practice with key ISF resources.
Resource HubThreat Horizon 2024: The disintegration of trust
Should organisations attempt to rebuild trust, or accept that it has disintegrated and adapt accordingly?
Read moreReview and Gap Analysis of Cybersecurity Legislation and Cybercriminality Policies in Eight Countries
The ISF, in conjunction with CC-DRIVER, have released a report detailing new methods to prevent, investigate and mitigate cybercrime.
Read moreLegal and Regulatory Implications for Information Security: People's Republic of China
Read the latest ISF research on how the Personal Information Protection Law (PIPL) will affect organisations how CII operators must follow and report on data protection and security procedures.
Read moreCyber Insurance: Is it worth the risk?
The cyber insurance market has sustainably grown in its relatively short history, but also displayed a volatility.
Read morePreparing for the General Data Protection Regulation
The European Union’s General Data Protection Regulation (the GDPR) brings data protection legislation into line…
Read moreSecuring the Supply Chain: Preventing your suppliers’ vulnerabilities from becoming your own
Sharing information with suppliers is essential for the supply chain to function. However information compromised…
Read moreEngaging with The Board: Balancing cyber risk and reward
When boards and CISOs engage successfully, organisations are better able to take advantage of the…
Read moreEstablishing A Business-Focused Security Assurance Programme: Confidence In Controls
How secure is your organisation’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?
Read moreData Leakage Prevention (DLP)
The increasing adoption of collaboration platforms, cloud services and social media, which are often accessed using personal devices, has introduced a host of new ways for sensitive data to leak.
Read more