Executive Updates

Physical Security – A Critical Component of Information Security

Information technology has transformed traditional business models and facilitated the creation of entirely new ones by integrating technology into business processes. With this integration, the lines between information security and traditional physical security have become blurred.

Physical Security – A Critical Component of Information Security.pdf

Why Information Security is a Critical Aspect of M and A Due Diligence

Most due diligence activities focus on a financial analysis of profit and loss and the bottom line. Experts from accounting firms, venture capital companies and law firms are very good at assessing the profitability and potential synergies of a merger or acquisition. But frequently, little, if any, attention is paid to the security posture of the organization under scrutiny, often with disastrous results.

Why Information Security is a Critical Aspect of M and A Due Diligence.pdf

Evolution of an International Information Security Standard

With public awareness of breaches such has Operation Aurora, the attack reported by Google and several other companies, the electronic theft of engineering details about the Pentagon’s Joint Strike Fighter project and the penetration of the U.S. electrical grid, the casual observer might come to the conclusion that information security has only recently become a topic of broad interest.

Evolution of an International Information Security Standard.pdf

Information Security as a Framework for Corporate Governance

What if there was a system that provided a framework to integrate new legal or regulatory requirements that affect the organization’s information assets in the shortest possible time and at the least possible cost?

What if you could systematically protect critical information assets and further protect the market value of your company?

Information Security as a Framework for Corporate Governance.pdf

Fact or Fiction – Checklist Certification

A prevalent misconception about information security is that an organization
can achieve conformance and improve information security via checklists and
technology-focused standards alone. Creating an information security
management system extends beyond the IT department and requires a
thoughtful, customized approach for every business.

Fact or Fiction – Checklist Certification.pdf

Insight Briefs

Supply Chain Security and ISO 28000

Security of the supply chain has always been a concern of transport, logistics and manufacturing companies. Concerns about theft, damage and shipment integrity intensify as the value per pound of cargo increases. Add the threat of organized crime, piracy and terrorism, and security of the supply chain becomes critical to business survival.

Supply Chain Security and ISO 28000.pdf