ISO 27000 - A Basis for Business Security Strategies

Download this Corporate IT Forum Executive Summary. The report has been compiled based on the shared experiences of 21 corporate IT professionals representing 14 different organisations from industries including charity, construction, consulting, government, healthcare, international food group, international law, logistics, petroleum, transport and utilities.
Log in to access this resource in full. If you do not have a login use the form below to request access.

Information request

I would like information about purchasing this resource
I'd like to know if my organisation is already a member
Sign me up for the monthly newsletter
Name*
Company*
Job Title*
Email*
Telephone
General enquiry or comment?
20134512
Sum the two numbers in white
and enter the total value below


Unparalleled Learning

Members Include

dmg-media-logo-colour-RGB-WEB-250px
johnlewis
mcdonalds
united biscuits
travis perkins
southwestwater
rexam
landregistry
HMRC
gchq
eon
dhl
EnvironmentAgency
BalfourBeatty
coop
BAE
aviva
01/17 
start stop bwd fwd

"Just wanted to say thanks; another great day where I have come out with more knowledge than I entered with"

"Many thanks; [the event was] very good and beneficial"

"I have never not found a day interesting"

"The Corporate IT Forum is a fantastic level check, free of vendor sell and consultancy hype. I like the open sharing of experience…"

"We get valuable knowledge and experience from members of The Corporate IT Forum. This helps us to make better and informed decisions to reach our business goals…"

"The knowledge from other people on what they are doing/have done is invaluable to my team"

"The workshop validated the marketplace for supplier apps; participants were of a uniformly high standard; personally, I value highly the ethos of the Forum in the fact that it is supplier independent"

Tel: +44 (0) 1442 866634
info@corporateITforum.com

Related Content

  • Security & Policy Development (Workshop Jul 2014)
  • tISS: Building & Integrating a Security Operations Centre (Report Apr 2014)
  • IT Security Infrastructure Maturity Assessment (Q&A Mar 2014)
  • Supporting Legacy Windows XP Desktops (Q&A Mar 2014)
  • ISO27001: 2013 (Report Feb 2014)
  • Corporate Espionage (Q&A Jan 2014)
  • Removing Local Administrator Rights (Q&A Jan 2014)
  • Cybercrime Resources (Q&A Nov 2013)
  • Cloud: Computing & Services Trends 2013 (Reality Checker May 2013)
  • Cloud Computing in the Real World (Report Dec 2012)
  • tISS: Security Strategies & Metrics (Reality Checker Nov 2012)
  • Disruptive Cloud & Consumerisation Technologies (Report Oct 2012)
  • tISS: Security Policy Development (Report Aug 2012)
  • Cloud Computing In 2012 (Reality Checker Feb 2012)
  • Service Management Maturity 2011 (Reality Checker Oct 2011)
  • Enterprise Architecture Frameworks (Reality Checker Nov 2010)
  • Banner
    Banner