The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending while ensuring compliance with regulatory mandates. This calls for decision makers to become vigilant in their spending and move towards an optimised information security investment. The main aim of this paper is to provide decision makers with a set of requirements to be considered when implementing a cost-effective and optimal information security budget; in a manner that preserve organisations’ information security posture and compliance status. Research reported on in this paper forms part of an ongoing project known as the BC3I (Broad Control Category Cost Indicators) framework.
Reference:
Dlamini, MT, Eloff, MM, Eloff, JHP and Hone, K. 2009. BC3I: towards requirements specification for preparing an information security budget. Information Security South Africa (ISSA 2009) Conference, University of Johannesburg, Johannesburg, 6-8 July 2009, pp 16
Dlamini, M., Eloff, M., Eloff, J., & Hone, K. (2009). BC3I: towards requirements specification for preparing an information security budget. http://hdl.handle.net/10204/4410
Dlamini, MT, MM Eloff, JHP Eloff, and K Hone. "BC3I: towards requirements specification for preparing an information security budget." (2009): http://hdl.handle.net/10204/4410
Dlamini M, Eloff M, Eloff J, Hone K, BC3I: towards requirements specification for preparing an information security budget; 2009. http://hdl.handle.net/10204/4410 .
Author:Dlamini, Moses T; Eloff, JHP; Eloff, MMDate:2009Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; where it came from, ...Read more
Author:Ngobeni, Sipho J; Grobler, MMDate:Jul 2009Recent technology advancement has resulted in an era where many organisations become more and more comfortable to use computer systems to process their information. Intruders are making it their mission to break into these computer systems ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Brazzoli, MDate:Apr 2010The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South Africa. The paper ...Read more