Can you be sure that you know exactly where your organisation’s most critical information assets are, and that they are being protected in line with their importance to the business? Building on our expertise in key disciplines such as information classification and information risk assessment, ISF Consultants will help you implement an approach to critical asset management and protection that enables your organisation to:

  • Identify its critical information assets based on their value to the business
  • Reflect the latest information risk assessment techniques to identify the threat profile of critical assets
  • Provide protection to critical information assets that reflects their threat profile and importance to the business, whilst using resources as efficiently as possible (by avoiding ‘over protection’)
  • Maintain a consistent approach that addresses each stage of the information life cycle, allowing for factors that may change over time (such as the value of an information asset to the business, risk profile, or adequacy of current controls).

Case Study:

ISF Consultants assisted a financial organisation to establish a critical asset protection programme, which involved: a comprehensive, enterprise-wide discovery exercise; detailed profiling of key threats (using the ISF’s Cyber Attack Chain); and the deployment of specialised protection to counter sophisticated, targeted attacks against these assets.

Executive Summary

Critical Information Asset Management and Protection

Please fill out the form below to download a complimentary Executive Summary.

Please provide your details to download this document:

The Information Security Forum (ISF) is a data controller for the personal data collected on this website.

For information on how we collect and use your personal data, please read our Privacy Notice.

Please read and agree with our Terms Of Use.

From time to time, the ISF would like to contact you regarding our latest products, services and events.

By ticking the relevant boxes below, please indicate your preferences on how you want to be contacted:

You can update your preferences at any time, or withdraw consent after submission by going to the ‘Already Registered’ tab.

Please enter the email address you previously registered with to access the download:

You have previously downloaded from our website. For more information on how we use your personal information, please see our Privacy Notice.

Please refamiliarise yourself with our Terms Of Use.

To update your preferences on how you would like to be contacted by the ISF, please indicate below:

To unsubscribe from all ISF communications. Click here: