background preloader

ISO 27000 - ISO 27001 and ISO 27002 Standards

ISO 27000 - ISO 27001 and ISO 27002 Standards

ISO17799 / ISO 17799 and ISO 27001 / ISO27001 News Security Case Studies Security case studies: Selected in-depth explorations of how leading organizations have approached critical security challenges. These case studies provide the chance to learn from your peers, whether you are creating an overall strategy or working to solve a specific tactical security problem. (Note: None of these articles were written or sponsored by product and service providers.) Case study collection updated 10/16/2012. Use these quicklinks to skip to any desired section: Leadership and Organizational Issues Governance, risk and complianceFiserv's GRC process and software implementation (2012) GRC is a process, not a technology. Alignment with corporate mission and profitabilityDunkin' Brands security focuses on making dough (2010)Insider registration.] Aligning corporate security with corporate priorities makes everyone's fortunes rise. E-discoveryNBC Universal takes e-discovery inhouse (2010) NBC Universal saw requests for e-discovery services soar in just a few years. [Also read

CIO Strategy – IT Management – Information Value Information is the currency of the 21st century enterprise. The challenge is how to govern and manage this information effectively. COBIT 5 is the latest edition of ISACA’s globally accepted framework, providing an end-to-end business view of the governance of enterprise IT that reflects the central role of information and technology in creating value for enterprises. The principles, practices, analytical tools and models found in COBIT 5 embody thought leadership and guidance from experts around the world. INSIGHTS for CIO's ISACA’s knowledge base of practical guidance, benchmarks and frameworks help enterprise leaders throughout the world adhere to regulations, build efficiencies, and improve the value of information and technology.

Related: