© Abhishek Chopra, Mukund Chaudhary 2020
A. Chopra, M. ChaudharyImplementing an Information Security Management Systemhttps://doi.org/10.1007/978-1-4842-5413-4_2

2. Assessing Needs and Scope

Abhishek Chopra1  and Mukund Chaudhary2
(1)
Faridabad, Haryana, India
(2)
Noida, India
 

BYOD must evolve from 'Bring Your Own Devil' to 'Bring Your Own Defense' associated to security probation and monitoring.

—Stéphane Nappo

Nearly all industries and organizations rely on computers to do their daily tasks, regardless of the industry they’re in, which means the security of digital information has become of upmost importance.

Organizations generate lots of business-critical information and no organization can keep up without that data. When planning to implement ISO ...

Get Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.