return to research
Research

Protecting the Crown Jewels: How to Secure Mission-Critical Assets

emerging threatscyber attacksrisk
Protecting the Crown Jewels: How to secure mission-critical assets
Download the executive summary

Valuable information is used to compete and succeed in a global market; information assets can represent more than 80% of an organisation’s total value.

Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised. These assets attract the attention of highly capable adversarial threats, all of whom are intent on exploiting this valuable information. Conventional approaches to protect the ‘crown jewels’ are not often sophisticated enough to stop highly motivated and capable and well-funded adversarial threats.

Protecting the Crown Jewels, aimed at CISOs and business leaders, introduces mission-critical information assets, outlines the main adversarial threats and presents the ISF Protection Process.

This structured and systematic five-phase process determines the approaches required to deliver comprehensive, balanced and end-to-end protection. It helps organisations to:

  • Identify a business’s mission-critical information assets
  • Assess the adversarial threats to these assets
  • Determine the most appropriate method to protect the ‘crown jewels’
  • Implement approaches that will ensure comprehensive and balanced protection.