All businesses need information security to protect our systems from the risk of threats. This Open Information Security management Maturity Model (O-Ism3) supports information security practitioners in this fundamental task by covering the key areas required to minimize these threats:
* Risk Management: identifying and estimating levels of exposure to the likelihood of loss and how to manage those risks of loss;
* Security Controls: crafting the It Security Policy which assures operations are as secure as they need to be;
* Security Management: supporting the selection, maintenance, and overall Security Policy for the security controls deployed in a business enterprise. The O-Ism3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-Ism3 with a wide variety of protection techniques used in the marketplace.