Information Security Forum helps businesses guard their 'crown jewels'

castle_portcullis

Traditional approaches to deploying security controls don't always provide appropriate or sufficient protection for mission-critical information assets.

Aiming to support enterprises in guarding this information, the Information Security Forum (ISF) is launching 'Protecting the Crown Jewels', a series of reports based on the ISF Protection Process, to help organizations formulate a structured, methodical process to deliver comprehensive, balanced protection.

The ISF Protection Process helps organizations identify mission-critical information assets, based on value and risk to the organization and the potential business impact if compromised. It also assists in assessing the threats to these assets, such as a competitor stealing trade secrets or an extremist group launching a cyber attack. It then helps determine the most appropriate approaches to deliver protection.

"Businesses must prioritize the protection of mission-critical information assets. Far too often, organizations consider the value of these assets, but fail to recognize the extent to which they are exposed to global security threats," says Steve Durbin, managing director of ISF. "Organizations that recognize both the value of, and the risks to, these assets will be best positioned to take advantage of the comprehensive, balanced, end-to-end protection that the ISF Protection Process delivers. Businesses should give careful consideration to all of the ISF resources in the Protecting the Crown Jewels series including the ISF Standard of Good Practice for Information Security, Benchmark and IRAM2: The next generation of assessing information risk".

At the same time the ISF is launching its global ISF Consultancy Services which offers short-term, professional counsel to support the implementation of ISF resources and products.

Protecting the Crown Jewels is available free to ISF members and can be purchased by non-members from the ISF website where you can also find details of the consultancy offerings.

Photo credit: khd / Shutterstock

Comments are closed.

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.