Sponsored by ComputerWeekly.com
Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps information Security Managers to evaluate their own operating environment and to plan their security management processes so they are consistent with and cost-effective for their organization’s business objectives. Access >>>
Table of contents
- Concepts – Processes, Capability, and Maturity
- ISM3 in Business Context
- Implementing ISM3
Premium Content for Free.
More Premium Content Accessible For Free
UK election special – who wins the digital vote?
In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos ...
Earning consumer trust in big data: a European perspective
This report from DLA Piper and the Boston Consulting Group Regulatory explains the fundamentally different approaches and attitudes towards data ...
Global Connectivity Index 2015
Which countries are the most digitally advanced? Find out in the 2015 Global Connectivity Index, which ranks 50 economies for their use of IT, ...