Sitemap
- Home
- Advisory
- Education
- Lighthouse
- Investments
-
Insights
-
Perspectives
- Navigate Your Digital Risk Landscape
- Strengthen the CORE: A Framework for CEOs to Build Cyber-Resilient Organisations
- Gaining Competitive Advantage from Cybersecurity
- Getting Cybersecurity Right for Manufacturing
- Where Should the CISO Report?
- A CEO and Investor's View on Cybersecurity and Resilience
- From Guard to Leader: The Changing Role of the CISO
- How Simplicity Can Lead to Improved Security
- Stopping The Domino Effect: Cyber Resilience in the Supply Chain
- Cyber Crisis Preparedness: How To Craft a Winning Playbook
- Creating Cyber Resilience By Routine
- Making Risk-Led Cyber Resilience a Reality
- Lessons from Cyberattacks on the Cloud
- 5 Ways Generative AI Will Impact Cybersecurity & What to Do About Them
- Mistakes and Lessons from Interacting with the Board on Cybersecurity
- Can AI Reverse the Defender’s Dilemma in Cybersecurity?
-
Articles
- Cyber Resilience in a Multi-Cloud Environment
- The CEO Report on Cyber Resilience
- CEO Report: Speak with the Author
- Cyber Resilience – It’s all about ESG
- Top 5 Threat Vectors in Connected Cars and How to Combat Them
- Keeping Clinical Trial Data Safe – Handling Cybersecurity in a Risky World
- Operational Technology and Zero Trust
- Welcome, Axio, to the ISTARI Collective
- Cyber Risk Management Company ISTARI Invests in Security Data Science Pioneer Prevalent AI
- Bridging the Gender Gap in Cybersecurity
- Sonrai Security Announces $50M in Series C Funding Led by ISTARI to Scale Multicloud Security for Global Enterprises
- Norsk Hydro Probe Shows Slow Pace of International Ransomware Cases
- Cyber Resilience Will Need to be Taken More Seriously by Healthcare in 2022
- Building a Secure Healthcare Organisation through Zero Trust
- Why is Ukraine Still Online?
- How To Prepare For A Cyber Crisis
- Time To Stop Ignoring Supply Chain Cybersecurity
- Pivoting Customers' Mindsets For Cloud Security
- How To Cut Your Company's Cybersecurity Costs
- Establishing A Strong Information Security Policy
- Staying Resilient: Cyber Resiliency In Medical Technology Supply Chains
- How We Used AI To Write An Article For Our Blog
- Implementing Zero Trust for Industrial Environments
- Transforming Cyber Risk Management in the Supply Chain
- The Future of DevSecOps: Emerging Trends in 2024 and Beyond
-
News
- Sonrai Security Announces $50M in Series C Funding Led by ISTARI
- V3 FinTech partners with ISTARI
- ISTARI Invests in Security Data Science Pioneer Prevalent AI
- Claroty acquires IoT security company Medigate after raising $400M in new funding
- Axio Raises $23M Series B Investment Round Led by ISTARI
- First-of-its-kind study explores the minds of CEOs in managing cyber risk and provides a playbook on how they can improve
- NanoLock Security and ISTARI Announce Strategic Collaboration
- ISTARI and Cambridge Judge Business School announce their strategic leadership development programme
- Axio Named a Leader in the CRQ Forrester Wave
- BlueVoyant Acquires Conquest Cyber
- ISTARI to Host Inaugural CHARTER, an Asia-Pacific Cyber Congress
- Bespoke Cybersecurity Governance Enablement Programme for Boards of Directors
-
Spotlight
- A Comprehensive Approach to Cyber Resilience
- State of Cloud Security: Concerns, Challenges, and Incidents
- The 5 Biggest Cloud Computing Trends in 2022
- A Closer Look at the DarkSide Ransomware Gang
- The management view - 7 strategies to build a more resilient team
- Fundamentals of Resilience – “Organising for Resilience”
- Predictable Surprises: The Disasters You Should Have Seen Coming
- Ransomware: Should paying hacker ransoms be illegal?
- Mis-spending on InfoSec Measures: Theory and Experimental Evidence
- Addressing Third Party Cyber Risk: Moving Beyond a False Sense of Security
- 3 Strategies to Secure Your Digital Supply Chain
- Inside a Sophisticated Cyberattack – Praying Mantis
- Organisational Cyber Maturity: A Survey of Industries
- The SEC Is Serious About Cybersecurity. Is Your Company?
- What is the Dark Web and Why Does It Matter for Cybersecurity?
- The Anatomy of Cyber Risk
- Managing Cyber Risk Across the Extended Vendor Ecosystem
- How Yahoo Built a Culture of Cybersecurity
- Cryptocurrency and Criminality: The Bitcoin Opportunity
- Security Accounts for Just 5.7% of IT Spend
- The Impact of Information Security Events on the Stock Market
- Post Incident Review of the Cyberattack on Ireland’s Health Service
- The Log4J Vulnerability
- Cybersecurity Predictions and Trends
- The Unusual Suspects
- How North Korea Tried to Steal $1 Billion
- Making Sense of the REvil Arrests
- Mutually Assured Destruction – Does Deterrence Work in Cyberspace?
- Re-cap: The Untold Story of NotPetya, The Most Devastating Cyberattack in History
- Global Incident Report: Ukraine-Russia Crisis
- Playing War Games To Prepare Your Leadership Team For A Cyber Attack
- How CEOs Can Pass The Cybersecurity Leadership Test
- What Cybersecurity Questions Should Boards Ask Their Management Team?
- Lessons learnt during the COVID-19 pandemic to prepare for the new normal
- Cyberattacks are inevitable. Is your company prepared?
- How a ransomware attack cost one firm £45m
- Managing Risk and Resilience
- Cyber Risk Quantified. Cyber Risk Managed.
- Sophos 2022 Threat Report: Interrelated Threats Target an Interdependent World
- Conti's Attack Against Costa Rica Sparks a New Ransomware Era
- Stopping the Domino Effect: Cyber Resilience in the Supply Chain
- The Quest For Resilience
- Cloud Economics and Damaging Mistakes to Avoid
- Global Cyber Risk and Insurance Survey 2022
- Cyber Insurance: The Market’s View
- The Economic View: The Cyber Insurance Market Needs More Money
- Uber’s Ex-Security Chief Faces Landmark Trial
- Your Employees Are Your Best Defence Against Cyber Attacks
- The Impact of CIO Characteristics on Data Breaches
- The State of Passwordless Security 2022
- Passwords Are Terrible, but Will Biometrics Be Any Better?
- Apple Just Killed the Password—for Real This Time
- What Is Zero Trust and Will It Change Security Forever?
- Zero Trust Adoption Report
- Why Enterprises Are Getting Zero Trust Wrong
- Top Three Use Cases for AI in Cybersecurity
- Artificial Intelligence and Cybersecurity
- OpenAI's New ChatGPT Bot: 10 Dangerous Things It's Capable Of
- Four Reasons The Cybersecurity Sector Could Remain Recession-Resilient
- Gartner: Security Spending To Rise Despite Recession Fears
- Security Budget Benchmark Summary Report 2022
- A Geopolitical Lens For Cybersecurity
- The 5x5 – The Future of Cyber Diplomacy
- The Geopolitics of Cybersecurity
- 2022 Cybersecurity Skills Gap
- The Cybersecurity Workforce Study
- 2022 Global Chief Information Security Officer (CISO) Survey
- Subscribe to Spotlight
- What Executives Should Take From Ex-Uber Security Chief Joe Sullivan's Sentence
- A CISO’s Guide - Legal Risks and Liabilities
- 2023 Voice of the CISO
- The Evolution of Cyber Operations in Armed Conflict
- Can You Negotiate Your Way Out of a Ransomware Attack?
- Resilience Is About How You Recharge, Not How You Endure
- The Misinformation Susceptibility Test
- Disinformation Is a Cybersecurity Threat
- Building Trust to Combat the Spread of Misinformation about Corporations
- Cybersecurity Legislation
- America’s Messy Cyber Regulations are No Match for its Adversaries
- Understanding the New SEC Cybersecurity Rules: A Guide for Executives
- WormGPT – The Generative AI Tool Cybercriminals Are Using to Launch Business Email Compromise Attacks
- ChatGPT can write ransomware, but what about incident response plans?
- Generative AI and ChatGPT Enterprise Risks
- 2023 Insider Threat Report
- McKinsey – Insider Threat: The Human Element of Cyberrisk
- Common Sense Guide to Mitigating Insider Threats
- How Yahoo Built a Culture of Cybersecurity
- The Size and Shape of Workforce Risk/High-Risk Users and Where to Find Them
- Beating MFA Fatigue: Why Hackers Have Resorted to Prompt Bombing
- The World Ahead – Ten Trends to Watch in 2024
- 2024 Gartner Top 10 Strategic Technology Trends
- Cybersecurity Forecast 2024, Insights for Future Planning
- The Foreign Influence Campaign in the 2016 US Election and Its Impact on Behaviour
- Deepfakes Emerge as a Top Security Threat Ahead of the 2024 US Elections
- Global Cybersecurity Outlook 2024
- The State of Supply Chain Defense
- Mitigate Enterprise Software Supply Chain Security Risks
- Supply Chain Security Guidance
- Salary Guide 2023
- 2023 Global Chief Information Security Officer (CISO) Survey
- State of Mental Health in Cybersecurity
- Analysis of Top 11 Cyber Attacks on Critical Infrastructure
- The Global State of Industrial Cybersecurity 2023
- 2023 Threat Report – OT Cyberattacks With Physical Consequences
- Vignette of the Month: CEO Deepfake at WPP
- Cyber Threat Landscape Report 2024
- A Review of Zero-Day in-the-Wild Exploits in 2023
- Cyber Security Toolkit for Boards
- Medical-Targeted Ransomware Is Breaking Records After Change Healthcare’s $22M Payout
- The State of Ransomware 2024
- Ransomware Trends, Statistics and Facts Heading into 2024
- Learning Lessons from the Cyber Attack
- Palo Alto isn’t going to buy everyone: the anatomy of cybersecurity startup exits
- Cybersecurity trends in 2024
- The Gili Ra’anan model: Questions emerging from Cyberstarts' remarkable success
- 7th Annual Hacker-Powered Security Report
- The State of Pentesting 2024
- ChatGPT and Google Gemini Pass Ethical Hacking Exams
- Top 10 Uses of Blockchain in Cybersecurity
- The Applications of Blockchain To Cybersecurity
- How Gray Market Cryptocurrency Exchanges Fuel Cybercrime
-
Voices Podcast
- Ep 101 - Exploring Perspectives on Zero Trust with John Kindervag
- Ep 102 - Chase Cunningham on How to Start Zero Trust
- Ep 103 - Dr. Jack Freund on How Zero Trust Quantifiably Reduces Risk
- Ep 104 David Fairman
- Ep 105 Matt Glenn, Illumio
- Ep 107 - Tamer Baker, Forescout
- Ep 108 - Jeff Moncrief, Sonrai Security
- Ep 109 John Moran, Tufin
- Ep 110 Micah Heaton (Part 1)
- Ep 111 Micah Heaton (Part 2)
- Ep 112 Samuel Hill, Claroty
- Ep 106 - Grant Meyer
- Ep 113 Lisa Lorenzin, ZScaler
- Ep 114 - Yotam Meitar, Sygnia
- Ep 115 Chris Hetner, Former SEC Chair Senior Cybersecurity Advisor
- Ep 116 - Evin Safdia, Cato Networks
- Ep 117 - Hub International & Axio Global with Scott Konrad
- Ep 118 – Benefits & Risks of AI in the Enterprise with John Petty
- Ep 119 - Getting a Handle on Asset & Data Inventory with Ashley Leonard, CEO of Syxsense
-
Events
- Conversations and Cocktails - Houston
- The Board and CEO’s View on Cyber Resilience: A Fireside Chat
- Malaysia: Healthcare Security Leaders Dinner
- The ISTARI Innovation Forum in New York
- ISTARI Advisory Board & Golf Event at BlackHat
- Enhancing Your TPRM Program: Strategies and Case Studies
- Enhancing Your TPRM Program Luncheon
- Interactive Cyber Wargame Workshop
-
Glossary
- Malware
- Dark Web
- Social Engineering
- What is Cybersecurity
- Managed Security Service Provider
- Cyber Attack
- Security Information and Event Management
- What is a Zero Day?
- Penetration Testing
- Cloud Security
- Gramm-Leach-Bliley Act
- NIST SP 800-53
- Cross-Site Scripting (XSS)
- Data Loss Prevention (DLP)
- SOX Compliance
- Principle of Least Privilege
- Cyber Kill Chain
- Data Security
- Threat Hunting
- Red Team vs Blue Team
- Advanced Persistent Threat (APT)
- Incident Response
- Threat Modeling
- Threat Intelligence
- Continuous Security Monitoring
- Third-Party Cyber Risk Management
- Security Posture Assessment
- Sensitive Information & Data
- Security Programme Optimisation
- Managed Security
- Supply Chain Attack
- Indicators of Compromise
- Operations Security
- Zero Trust
- Cyber Resilience
- Cybersecurity Executive Order
- Post-Quantum Cryptography
-
Perspectives
- About
- Contact Us
- Privacy Notice
- Cookie Notice
- Terms and Conditions
- Corporate Information