Determine The Value Of Information Security Assets And Liabilities — Information Security Economics 102
May 8, 2013
Why Read This Report
This is the second in a series of reports providing guidance and new methods for the financial management of information security. The CISO's role is rapidly changing. A few years ago the CISO for many midsize firms was the security operations manager, and the job then was to employ technical skills to keep desktops, servers, and networks protected. Even in larger firms, the CISO still was sharply focused on technical IT security issues. Now, with losses from cybercrime spiraling out of control, security and risk professionals need a broad cross-section of financial skills and tools to be effective defenders of the enterprise. They need to effectively analyze how they allocate security resources to maximize their value to the business. Using a tool like the balance sheet — an information security balance sheet — will help you understand your information posture better, helping you account for the assets and liabilities you have as a security and risk professional.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- Hello 21st Century! Information Is Where The Money Is
- Companies Have Trillions In Goodwill And Intangible Assets
- Information Security Needs To Focus On Assets And Liabilities
- Identify And Value Information To Measure Your Security Posture
- The Information Security Balance Sheet Puts It All Into Perspective
WHAT IT MEANS
- Security And Risk Pros Need A Way To Value Information
- Supplemental Material
- Related Research Documents
Twelve Recommendations For Your Security Program In 2016
April 21, 2016 | Heidi Shey
Twelve Recommendations For Your Security Program In 2015
March 12, 2015 | Ed Ferrara