Skip to Main Content
The True Cost of Information Security Breaches: A Business Approach
book

The True Cost of Information Security Breaches: A Business Approach

by Prof.John Walker, Michael Krausz
July 2013
Beginner to intermediate content levelBeginner to intermediate
73 pages
1h 20m
English
IT Governance Publishing
Content preview from The True Cost of Information Security Breaches: A Business Approach
29
CHAPTER 3: COST FACTORS OF A
BREACH
In this chapter we will analyse and examine the
diverse cost factors of a breach, ultimately
comparing these with the implementation cost of
an ISMS, thereby hoping to serve all those CISOs
and CSOs who have to justify their budget on a
daily basis. There are cases in which simply
paying for the breach will actually be less costly
than implementing an ISMS, but this is an absolute
exception and does not work long term. Long
term, if you are high-profile enough, you may well
be attacked by unsophisticated or sophisticated
means, and the cost of implementing an ISMS will
always be lower than the cumulated cost of caring
for breaches.
We can differentiate between two types of cost
factors: those that ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Once More Unto the Breach: Managing information security in an uncertain world

Once More Unto the Breach: Managing information security in an uncertain world

Andrea C Simmons

Publisher Resources

ISBN: 9781849284967