Trends Report

Develop Your Information Security Management System

January 19th, 2017
With contributors:
Stephanie Balaouras , Christopher McClean , Claire O'Malley , Trevor Lyness , Sam Bartlett

Summary

The chief information security officer's (CISO) role is fraught with many challenges, including more sophisticated adversaries, a larger attack surface, increasing regulation, and customer demands. Stretched in so many directions, the CISO can easily neglect the fundamental processes by which the security team identifies, evaluates, and treats security risks. This report describes how to use an information security management system (ISMS) to drive risk ownership, continual improvement, and deep business engagement. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.