ISMS Business Case Builder - Doing Other Work for Broader Security Confidence & Assurance with Higher RoI
What other work can be done for broader security confidence & assurance?
Forward thinking organisations are looking beyond just protecting personal data. They are seeing the value of following recognised frameworks such as ISO 27001:2013, or NIST Cyber Security.
A benefit of this approach is being able to more easily demonstrate to stakeholders you can be trusted, and smarter buyers will understand the work you are doing too.
ISO 27001:2013 is even better because you can (if desired) also achieve an independent highly respected certification that helps demonstrate your commitment for stakeholders.
Reflect back on the analysis from the threats and opportunities work earlier. It will almost certainly deliver a higher return on investment (RoI) by extending the scope of information and adopting a recognised framework despite there being a bit more work to do as well.
ISO 27001:2013 has additional work beyond that required for GDPR however there are also lots of synergy areas too. As such, depending on stakeholder expectations (now and in the future) it can make sense to future proof a GDPR investment with an intent towards achieving ISO 27001:2013 as well.
An ISMS delivers a positive return on investment. The goal of our whitepaper is to show you why, what, and how you can get RoI from an ISMS that fits the business needs.
You can download it now to share with colleagues or work through the considerations online using the index below.
What are the key considerations when building the business case for an ISMS?
- A growing challenge
- Three reasons why nothing happens
- The return on investment from information security management
- A point on people
- In considering the technology
- What is an ISMS?
- What are the components of an ISMS?
- Why do organisations need an ISMS?
- Is your organisation leadership ready to support an ISMS?
- Developing the business case for an ISMS
- Benefits to realise - Achieving returns from the threats and opportunities
- Evaluating the threats
- Identifying the opportunities
- Stakeholder expectations for the ISMS given their relative power and interest
- Scoping the ISMS to satisfy stakeholder interests
- GDPR focused work
- Doing other work for broader security confidence and assurance with higher RoI
- Work to get done for ISO 27001:2013/17
- Build or buy - Considering the best way to achieve ISMS success
- Understanding the components of an ISMS solution
- The people involved in the ISMS
- The characteristics of a good technology solution for your ISMS
- Whether to build or buy the technology part of the ISMS
- The core competences of the organisation, costs and opportunity costs
- In conclusion