Skip to Main Content
The True Cost of Information Security Breaches: A Business Approach
book

The True Cost of Information Security Breaches: A Business Approach

by Prof.John Walker, Michael Krausz
July 2013
Beginner to intermediate content levelBeginner to intermediate
73 pages
1h 20m
English
IT Governance Publishing
Content preview from The True Cost of Information Security Breaches: A Business Approach
3: Cost Factors of a Breach
39
still the risk of losing knowledgeable personnel
cannot be underestimated.
So, what does an ISMS cost?
Let’s look at what you need first and then present
timelines and cost items. All cost items will
depend on your employees’ salaries and on the
cost of external consultants you may want to bring
in. This is advisable if you are under time pressure.
Consultants are also usually brought in for an
efficient knowledge transfer, but their time of
engagement is vastly reduced by up to 90 percent.
Table 1 summarises the most important steps
necessary to set up an ISMS and differentiates
between a certified and a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Once More Unto the Breach: Managing information security in an uncertain world

Once More Unto the Breach: Managing information security in an uncertain world

Andrea C Simmons

Publisher Resources

ISBN: 9781849284967