Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Reaching escape velocity A practiced approach to information security management system implementation

Reaching escape velocity A practiced approach to information security management system... Purpose – This paper aims to demonstrate and offer an open source toolkit with the intent that making technology available to the community may serve to support organizations planning an information security management system implementation. Design/methodology/approach – A case study is presented which highlights the authors' approach to building capability and subsequently overcoming inertial forces which would otherwise have impeded the organization's compliance initiative. Findings – The case study proposes a novel approach to managing an ISMS implementation through the use of a custom developed toolkit, which based on the experience of the authors enabled the subject organization to achieve ISO 27001 certification. Practical implications – The adoption of the approach and tradecraft presented in the paper may enable similar organizations in building capacity to better manage information security programs. Originality/value – Insomuch as the recently revised ISO 27001 Information Security Code of Practice is well documented, comprehensive, methodological and widely supported, it is evident from the relatively low volume of certifications (a list of current certification registrations may be found at the ISMS International User Group Certificate Register – www.iso27001certificates.com), that many compliance initiatives are challenged in realizing full success. Based on the experiences presented in this paper, the authors believe these challenges must be overcome with appropriate capability building necessary to achieve a successful implementation. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Information Management & Computer Security Emerald Publishing

Reaching escape velocity A practiced approach to information security management system implementation

Loading next page...
 
/lp/emerald-publishing/reaching-escape-velocity-a-practiced-approach-to-information-security-0Rncyez491

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Emerald Publishing
Copyright
Copyright © 2008 Emerald Group Publishing Limited. All rights reserved.
ISSN
0968-5227
DOI
10.1108/09685220810862742
Publisher site
See Article on Publisher Site

Abstract

Purpose – This paper aims to demonstrate and offer an open source toolkit with the intent that making technology available to the community may serve to support organizations planning an information security management system implementation. Design/methodology/approach – A case study is presented which highlights the authors' approach to building capability and subsequently overcoming inertial forces which would otherwise have impeded the organization's compliance initiative. Findings – The case study proposes a novel approach to managing an ISMS implementation through the use of a custom developed toolkit, which based on the experience of the authors enabled the subject organization to achieve ISO 27001 certification. Practical implications – The adoption of the approach and tradecraft presented in the paper may enable similar organizations in building capacity to better manage information security programs. Originality/value – Insomuch as the recently revised ISO 27001 Information Security Code of Practice is well documented, comprehensive, methodological and widely supported, it is evident from the relatively low volume of certifications (a list of current certification registrations may be found at the ISMS International User Group Certificate Register – www.iso27001certificates.com), that many compliance initiatives are challenged in realizing full success. Based on the experiences presented in this paper, the authors believe these challenges must be overcome with appropriate capability building necessary to achieve a successful implementation.

Journal

Information Management & Computer SecurityEmerald Publishing

Published: Mar 21, 2008

Keywords: Information management; Information systems; Standards; Data security

There are no references for this article.