Optimizing ISO/IEC 27001 Using O-ISM3

Read more about a recently published Open Group guide titled “Optimizing ISO/IEC 27001 using O-ISM3” that is relevant to organizations using ISO27001/27002 as their Information Security Management System (ISMS). Continue reading →

More on boundary of identity versus control

Following on from ‘Boundary of identity, boundary of control‘ and ’inside-out versus outside-in‘, perhaps the quickest way to understand the difference: the boundary-of-control delimits what the lawyers think the organisation is the boundary-of-identity delimits what everyone else thinks the organisation is