Information Security Blog

Pineapples & Information Security Management Systems

Pineapples & Information Security Management Systems

The other day my co-workers and I were having lunch and I was eating fruit.  One of them noted that he really doesn’t enjoy fruit very much.  When I replied that I only really like fruit that is “not a lot of work” — the chop busting began.  It only got worse when my answer was cantaloupe, honeydew, and pineapple.  Their opinion was that they were the  hardest fruits to eat because of the amount of work necessary.  When I explained that I thought the hardest fruits to eat were apples, oranges, and pears — they had a good laugh at my expense — as they thought I clearly had things backwards.

I understood their reasoning and frankly felt a little dumb for not being able to communicate my reasoning a bit better. It was not until a week later when I was cutting a pineapple that I came to the realization about why I feel the fruits I mentioned are easier to eat.  They are easier to eat because you only have to make the effort to prepare them once.  After cutting them up — there is large amount of delicious fruit that is easy to enjoy for an extended period of time.

In an odd way — its sort of the same way with establishing an Information Security Management System (ISMS).  I’ll illustrate my point with a recent project I worked on.

We were engaged by an engineering client  to implement a NIST 800-53 R4 based ISMS to meet the flow-down requirements of a contract they had won.  Like many organizations things were done in a largely ad-hoc manner — so we were starting from scratch.  Much like a ripe pineapple — building an ISMS based on NIST 800-53 in a compressed time frame can be daunting to tackle; with little immediate payback.

However, after a few weeks of hard work, things began to crystallize.  We were able to jointly implement a strong road-map for their ISMS program.  Ripe pineapples & information security management systems – done right — both can be fruitful.


Is ISO 27001 Right for (Y)our Organization?


Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

About the Author:

John Verry (CISA, 27001 Certified Lead Auditor, CCSE, CRISC) is Pivot Point's resident "Security Sherpa". He is lucky enough to spend most of his day helping clients develop a road map to address security, compliance, and attestation requirements.

Add a Comment

Share This