Executive Summary

Effective Information Security Management Begins with a Methodology

Posted November 30, 2006 | Leadership | Leadership |

Think of all the planning, resource allocation, and tactical decisions managers face in building a more effective information security management system (ISMS). And complexity scales with the size of an organization; just identifying all the assets that require risk mitigation protection can represent a major undertaking. Organizations should seriously consider building a planning and decision-making methodology as the chief vehicle for transporting themselves from ISMS mediocrity to excellence.

About The Author
John Berry
John Berry Senior Consultant John Berry is a management consultant with extensive experience in helping organizations execute strategies designed to deliver breakthrough value from IT and other investments. He is the inventor of a portfolio of strategic planning and value analysis methodologies that guide managers in their IT investment and sourcing decisions. He is also the author of Tangible Strategies for Intangible Assets (McGraw-Hill, 2004… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.