In this step of the ISF Protection Process, you apply fundamental, enhanced and specialized controls throughout the information life cycle. Durbin says protecting mission-critical information assets throughout their life cycle reduces potential gaps and underpins comprehensive and end-to-end protection.
Protecting the Crown Jewels is available at no cost to ISF member organizations and for purchase by non-members. It includes a report targeted at CISOs and business leaders that introduces mission-critical information assets and outlines key adversarial threats, and an implementation guide and other supporting materials targeted at information risk specialists and information security professionals that provide practical steps to implement and embed the ISF Protection Process.
Sign up for CIO Asia eNewsletters.