© Abhishek Chopra, Mukund Chaudhary 2020Abhishek Chopra and Mukund ChaudharyImplementing an Information Security Management Systemhttps://doi.org/10.1007/978-1-4842-5413-4_3
If I had six hours to chop down a tree, I’d spend the first four hours sharpening the axe.
In the previous chapter, you learned about setting the scope and timeline of your implementation. It then becomes essential to kick off the ISMS implementation project in your organization, as it will help communicate to all key stakeholders/interested parties/employees that information security practices will be implemented and rolled out throughout the organization. ...