Valuable information is used to compete and succeed in a global market; information assets can represent more than 80% of an organisation’s total value.

Mission-critical information assets – an organisation’s “crown jewels” – are information assets of greatest value and would cause major business impact if compromised. These assets attract the attention of highly capable adversarial threats, all of whom are intent on exploiting this valuable information. Conventional approaches to protect the ‘crown jewels’ are not often sophisticated enough to stop highly motivated and capable and well-funded adversarial threats.

The Protecting the Crown Jewels report targeted primarily at CISOs and business leaders, introduces mission-critical information assets, outlines the main adversarial threats and presents the ISF Protection Process.

The Implementation Guide equips information risk specialists and information security professionals with the practical steps to implement and embed the ISF Protection Process.

This structured and systematic five-phase process determines the approaches required to deliver comprehensive, balanced and end-to-end protection. It helps organisations to:

  • Identify a business’s mission-critical information assets
  • Assess the adversarial threats to these assets
  • Determine the most appropriate method to protect the ‘crown jewels’
  • Implement approaches that will ensure comprehensive and balanced protection.

ISF provides Members and Non-Members with the opportunity to purchase short-term, professional support activities to supplement the implementation of the ISF Protection Process.

Executive Summary & Press Release

Protecting the Crown Jewels: How to Secure Mission-Critical Assets

Please fill out the form below to download a complimentary Executive Summary & Press Release.

Please provide your details to download this document:

Please check this box to confirm that you have read and agree with our Privacy Policy and Terms Of Use

By downloading this document you agree to being contacted by the ISF.

Please enter the email address you previously registered with to access the download: