Advisor

The Information Security Maturity Model: A Roadmap to Security Excellence

Posted July 12, 2007 | Leadership | Leadership | Leadership |

The responsibility for establishing and maintaining information security today looks like a Scrabble board. COSO, COBIT, ITIL, ISO, and ASIS1 (apologies if I missed any other tiles) are either standards bodies that evangelize practices or acronyms for the management practices themselves -- all designed to help organizations optimize today's information security strategy and contend with tomorrow's threats. Whatever approach an organization adopts, there is one other standard worth considering first.

About The Author
John Berry
John Berry Senior Consultant John Berry is a management consultant with extensive experience in helping organizations execute strategies designed to deliver breakthrough value from IT and other investments. He is the inventor of a portfolio of strategic planning and value analysis methodologies that guide managers in their IT investment and sourcing decisions. He is also the author of Tangible Strategies for Intangible Assets (McGraw-Hill, 2004… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.