<s>
Information	B-Application
security	I-Application
management	I-Application
(	O
ISM	O
)	O
defines	O
and	O
manages	O
controls	O
that	O
an	O
organization	O
needs	O
to	O
implement	O
to	O
ensure	O
that	O
it	O
is	O
sensibly	O
protecting	O
the	O
confidentiality	O
,	O
availability	O
,	O
and	O
integrity	O
of	O
assets	O
from	O
threats	O
and	O
vulnerabilities	O
.	O
</s>
<s>
As	O
part	O
of	O
information	B-Application
security	I-Application
management	I-Application
,	O
an	O
organization	O
may	O
implement	O
an	O
information	B-Application
security	I-Application
management	I-Application
system	I-Application
and	O
other	O
best	O
practices	O
found	O
in	O
the	O
ISO/IEC	O
27001	O
,	O
ISO/IEC	O
27002	O
,	O
and	O
ISO/IEC	O
27035	O
standards	O
on	O
information	O
security	O
.	O
</s>
<s>
A	O
meteorite	O
crashing	O
into	O
a	O
server	B-Application
room	I-Application
is	O
certainly	O
a	O
threat	O
,	O
for	O
example	O
,	O
but	O
an	O
information	O
security	O
officer	O
will	O
likely	O
put	O
little	O
effort	O
into	O
preparing	O
for	O
such	O
a	O
threat	O
.	O
</s>
<s>
An	O
information	B-Application
security	I-Application
management	I-Application
system	I-Application
(	O
ISMS	O
)	O
represents	O
the	O
collation	O
of	O
all	O
the	O
interrelated/interacting	O
information	O
security	O
elements	O
of	O
an	O
organization	O
so	O
as	O
to	O
ensure	O
policies	O
,	O
procedures	O
,	O
and	O
objectives	O
can	O
be	O
created	O
,	O
implemented	O
,	O
communicated	O
,	O
and	O
evaluated	O
to	O
better	O
guarantee	O
the	O
organization	O
's	O
overall	O
information	O
security	O
.	O
</s>
<s>
Implementing	O
an	O
effective	O
information	B-Application
security	I-Application
management	I-Application
(	O
including	O
risk	O
management	O
and	O
mitigation	O
)	O
requires	O
a	O
management	O
strategy	O
that	O
takes	O
note	O
of	O
the	O
following	O
:	O
</s>
<s>
Upper-level	O
management	O
must	O
strongly	O
support	O
information	O
security	O
initiatives	O
,	O
allowing	O
information	O
security	O
officers	O
the	O
opportunity	O
"	O
to	O
obtain	O
the	O
resources	O
necessary	O
to	O
have	O
a	O
fully	O
functional	O
and	O
effective	O
education	O
program	O
"	O
and	O
,	O
by	O
extension	O
,	O
information	B-Application
security	I-Application
management	I-Application
system	I-Application
.	O
</s>
<s>
Milestones	O
and	O
timelines	O
for	O
all	O
aspects	O
of	O
information	B-Application
security	I-Application
management	I-Application
help	O
ensure	O
future	O
success	O
.	O
</s>
<s>
Without	O
sufficient	O
budgetary	O
considerations	O
for	O
all	O
the	O
above	O
—	O
in	O
addition	O
to	O
the	O
money	O
allotted	O
to	O
standard	O
regulatory	O
,	O
IT	O
,	O
privacy	O
,	O
and	O
security	O
issues	O
—	O
an	O
information	B-Application
security	I-Application
management	I-Application
plan/system	O
can	O
not	O
fully	O
succeed	O
.	O
</s>
<s>
The	O
ISO/IEC	O
27000	O
family	O
represents	O
some	O
of	O
the	O
most	O
well-known	O
standards	O
governing	O
information	B-Application
security	I-Application
management	I-Application
and	O
the	O
ISMS	O
and	O
are	O
based	O
on	O
global	O
expert	O
opinion	O
.	O
</s>
<s>
COBIT	O
,	O
developed	O
by	O
ISACA	O
,	O
is	O
a	O
framework	O
for	O
helping	O
information	O
security	O
personnel	O
develop	O
and	O
implement	O
strategies	O
for	O
information	O
management	O
and	O
governance	O
while	O
minimizing	O
negative	O
impacts	O
and	O
controlling	O
information	O
security	O
and	O
risk	O
management	O
,	O
and	O
2.0	O
is	O
The	B-Application
Open	I-Application
Group	I-Application
's	O
technology-neutral	O
information	O
security	O
model	O
for	O
enterprise	O
.	O
</s>
