Executive Report

Effective Information Security Management Begins with a Methodology

Posted November 30, 2006 | Leadership | Leadership |

Like bad weather, information security risks are here for the duration. Maintaining the stance of constant vigilance against persistent threats to information assets requires an information security management structure more disciplined, more organizationally embedded, and, generally, more effective than what some companies have today. In other words, these companies should consider an information security management methodology.

About The Author
John Berry
John Berry Senior Consultant John Berry is a management consultant with extensive experience in helping organizations execute strategies designed to deliver breakthrough value from IT and other investments. He is the inventor of a portfolio of strategic planning and value analysis methodologies that guide managers in their IT investment and sourcing decisions. He is also the author of Tangible Strategies for Intangible Assets (McGraw-Hill, 2004… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.