{"id":13915,"date":"2021-08-25T13:59:02","date_gmt":"2021-08-25T08:29:02","guid":{"rendered":"https:\/\/www.invensislearning.com\/blog\/?p=13915"},"modified":"2026-04-06T11:21:20","modified_gmt":"2026-04-06T05:51:20","slug":"information-security-management","status":"publish","type":"post","link":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/","title":{"rendered":"A Comprehensive Overview of Information Security Management"},"content":{"rendered":"<p class=\"mini-text\" style=\"text-align: justify;\">Information security describes the activities which are related to the protection of information and infrastructure assets against the risk of being misused, lost, disclosed, and damaged. Information Security Management (ISM) is a governance activity within the corporate governance framework. ISM describes the controls which are necessary to be implemented by an organization to make sure that is sensibly managing the risks. The main purpose of ISM in ITIL is to align IT security with business security and make sure that it matches the required needs of the business.<\/p>\n<h2><strong>The Objective of Information Security Management in ITIL<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The objectives of ISM are to ensure that:<\/p>\n<ul>\n<li class=\"mini-text margin-top-20\">Information is available and ready to use whenever it is required.<\/li>\n<li class=\"mini-text margin-top-20\">The systems which provide information can resist attacks adequately and recover from failures\/prevent them.<\/li>\n<li class=\"mini-text margin-top-20\">The information is visible or disclosed to only those people who have the necessary clearance and have the right to know.<\/li>\n<li class=\"mini-text margin-top-20\">The information is complete, accurate, and has complete protection against modification by unauthorized personnel.<\/li>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The business transactions and exchange of information between enterprises or partners are trustworthy.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.invensislearning.com\/itil-4-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignnone wp-image-10077 size-full\" src=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg\" alt=\"ITIL 4 Foundation - Invensis Learning\" width=\"864\" height=\"90\" srcset=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg 864w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-300x31.jpg 300w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-768x80.jpg 768w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-150x16.jpg 150w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-696x73.jpg 696w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><\/a><\/p>\n<h2 class=\"margin-top-20\"><strong>Scope of Information Security Management in ITIL\u00a0<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">Things such as data stores, databases, metadata, and all the channels used to exchange that information. It raises awareness all across the organization regarding the need to keep all the information assets safe. ISM should understand the following:<\/p>\n<ul>\n<li>The plans and policies of business security.<\/li>\n<li>The present operations the business and security requirements.<\/li>\n<li>The plans and requirements of the business for the future.<\/li>\n<li>The legislative requirements.<\/li>\n<li>The responsibilities and obligations regarding security are contained in the service level agreements.<\/li>\n<li><a title=\"click here to know about the risk management\" href=\"https:\/\/www.invensislearning.com\/blog\/risk-management-in-itil\/\" target=\"_blank\" rel=\"noopener noreferrer\">The risks in business<\/a> and IT and their management.<\/li>\n<\/ul>\n<h2 class=\"margin-top-20\"><strong>Value of Information Security Management in ITIL\u00a0<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">Implementing Information Security Management in an organization imparts a lot of benefits such as:<\/p>\n<ul>\n<li class=\"mini-text margin-top-20\">Ensures that the information security policy is maintained and enforced properly such that the needs of the business security policy and corporate governance are fulfilled.<\/li>\n<li class=\"mini-text margin-top-20\">It helps to protect all forms of information such as the ones which are digitally stored on devices and the cloud, paper-based, company secrets, and intellectual property.<\/li>\n<li class=\"mini-text margin-top-20\">Increases the resistance to cyber-attacks and malware if implemented properly.<\/li>\n<li class=\"mini-text margin-top-20\">It provides a framework for keeping all the information safe which is managed from one place.<\/li>\n<li class=\"mini-text margin-top-20\">Adapts to constant changes in the threat environment and reduces the security threats which are constantly evolving.<\/li>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">It helps to reduce the costs which are associated with information security by adding only the protection layers which are necessary and removing the redundant ones.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.invensislearning.com\/itil-4-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignnone wp-image-10077 size-full\" src=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg\" alt=\"ITIL 4 Foundation - Invensis Learning\" width=\"864\" height=\"90\" srcset=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg 864w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-300x31.jpg 300w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-768x80.jpg 768w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-150x16.jpg 150w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-696x73.jpg 696w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><\/a><\/p>\n<h2 class=\"margin-top-20\"><strong>Basic Concepts of Information Security Management<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The following basic concepts are necessary to understand Information Security Management.<\/p>\n<h3 class=\"margin-top-20\"><strong>Information Security Policy<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The information security policy needs to have complete support and commitment from the senior-level IT and business management in the organization. It should have under its purview all the areas of information security and the appropriate measures to meet the objectives of Information security management.<\/p>\n<p><em><strong>Explore the blog to understand how an <a href=\"https:\/\/www.invensislearning.com\/blog\/information-security-analyst-responsibilities\/\" target=\"_blank\" rel=\"noopener\">Information Security Analyst<\/a> plays a critical role in creation of the information security policy!<\/strong><\/em><\/p>\n<h3 class=\"margin-top-20\"><strong>Risk Assessment and Management<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">It is vital to have a formal risk assessment and management policy that is related to information security and processing. It often collaborates with the business, It service continuity management, and <a title=\"click here to know about availability management\" href=\"https:\/\/www.invensislearning.com\/blog\/availability-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">availability management<\/a>\u00a0in order to perform risk assessments.<\/p>\n<h3 class=\"margin-top-20\"><strong>Information Security Management System<\/strong><\/h3>\n<p class=\"margin-top-20\" style=\"text-align: justify;\">The system forms the basis for developing a cost-effective program for information security that supports the objectives of the business. It focuses on the five key elements which are control, plan, implement, evaluate and maintain. Organizations can seek independent certification of their Information Security Management against the ISO\/IEC 27001 standard.<\/p>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/nRsVb1j9jyo\" width=\"615\" height=\"318\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">?<\/span><\/iframe><\/p>\n<h2 class=\"margin-top-20\"><strong>The Framework of Information Security Management in ITIL<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">There are five key elements that are addressed in an Information Security Management system framework.<\/p>\n<p><img class=\"wp-image-13919 size-full aligncenter\" src=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-framework.png\" alt=\"information security management in ITIL - invensis learning \" width=\"601\" height=\"502\" srcset=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-framework.png 601w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-framework-300x251.png 300w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-framework-150x125.png 150w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-framework-503x420.png 503w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/p>\n<h3 class=\"min-text-list-p\"><strong>1. Control<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">A management framework should be established to manage information security, prepare and implement a policy, allocate responsibilities, to establish and control the documentation.<\/p>\n<h3 class=\"min-text-list-p\"><strong>2. Plan<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">This phase of the framework involves the collection of information and understanding of the security requirements of the organization. Afterward, the appropriate solutions should be recommended keeping in mind the budget and corporate culture.<\/p>\n<h3 class=\"min-text-list-p\"><strong>3. Implement<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">In the implementation phase, the plan will be put into action. While doing so, it is important to ensure that adequate safeguards are in place to enact and enforce the information security policy.<\/p>\n<h3 class=\"min-text-list-p\"><strong>4. Evaluate<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">After the security policies and plans have been implemented, it is necessary to monitor them and make sure that the systems are completely secure and operating in accordance with the policies, security requirements, and service level agreements of the organization.<\/p>\n<h3 class=\"min-text-list-p\"><strong>5. Maintain<\/strong><\/h3>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">For an information management system to be effective, it needs to be improved on a continuous basis. This involves revising the service level agreements, security policies, and the techniques used to monitor and control.<\/p>\n<h2 class=\"margin-top-20\"><strong>Process Activities of Information Security Management in ITIL<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The main activities of Information Security Management are:<\/p>\n<p><strong><img class=\"wp-image-13920 size-full aligncenter\" src=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-process-activities.png\" alt=\"information security process activities - invensis learning \" width=\"596\" height=\"497\" srcset=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-process-activities.png 596w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-process-activities-300x250.png 300w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-process-activities-150x125.png 150w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/information-security-management-process-activities-504x420.png 504w\" sizes=\"(max-width: 596px) 100vw, 596px\" \/><\/strong><\/p>\n<ul>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">Create, review and revise the information security policy as per the requirements.<\/li>\n<li class=\"mini-text margin-top-20\">Communicate, implement and enforce the security policies adequately.<\/li>\n<li class=\"mini-text margin-top-20\">Analyze and classify all the information and documentation in possession.<\/li>\n<li class=\"mini-text margin-top-20\">Implement a set of security controls and risk responses and improve them.<\/li>\n<li class=\"mini-text margin-top-20\">Constantly monitor and manage all breaches of security and any major security incidents.<\/li>\n<li class=\"mini-text margin-top-20\">Analyze, report on, and take the necessary actions in order to decrease the volume and effect of security incidents.<\/li>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">Schedule and perform security reviews, audits, and penetration tests.<\/li>\n<\/ul>\n<h2><strong>Challenges of Information Security Management<\/strong><\/h2>\n<p class=\"mini-text margin-top-20\" style=\"text-align: justify;\">The challenges faced by information security management are:<\/p>\n<ul>\n<li class=\"mini-text margin-top-20\">It has to ensure that there is adequate support for the information security policy from the business. This is because information security objectives cannot be fulfilled with adequate support and endorsement from top-level management.<\/li>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">A constantly evolving threat scenario where newer and stronger threats keep popping up.<\/li>\n<\/ul>\n<h2 class=\"margin-top-20\"><strong>Risks of Information Security Management<\/strong><\/h2>\n<p class=\"margin-top-20\" style=\"text-align: justify;\">The risks which are encountered by information security management are:<\/p>\n<ul>\n<li class=\"mini-text margin-top-20\">A lack of commitment from the business to the ISM process.<\/li>\n<li class=\"mini-text margin-top-20\">A lack of resources or budget for the process.<\/li>\n<li class=\"mini-text margin-top-20\" style=\"text-align: justify;\">Risk assessment is conducted in an isolated manner without combining with availability management and <a title=\"click here to know about IT Service Continuity Management\" href=\"https:\/\/www.invensislearning.com\/blog\/it-service-continuity-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT Service Continuity Management<\/a>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.invensislearning.com\/itil-4-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignnone wp-image-10077 size-full\" src=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg\" alt=\"ITIL 4 Foundation - Invensis Learning\" width=\"864\" height=\"90\" srcset=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2.jpg 864w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-300x31.jpg 300w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-768x80.jpg 768w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-150x16.jpg 150w, https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2020\/11\/ITIL-4-Foundation-864x90-2-696x73.jpg 696w\" sizes=\"(max-width: 864px) 100vw, 864px\" \/><\/a><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p class=\"mini-text\" style=\"text-align: justify;\">Through proper implementation, it ensures that information is available and ready to use whenever it is required, and the systems which provide information can resist attacks adequately and recover from failures or prevent them. Learn more about such concepts in the ITIL 4 Foundation certification and gain professional expertise in service management to excel in your career.<\/p>\n<p style=\"text-align: justify;\"><i>Know more about Service Management best practices through Invensis Learning\u2019s IT Service Management certification training on <a href=\"https:\/\/www.invensislearning.com\/itil-4-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ITIL 4 Foundation Online&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15297,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:2,&quot;11&quot;:0,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Calibri, sans-serif&quot;,&quot;16&quot;:11}\">ITIL 4 Foundation Online<\/span><\/a>,\u00a0<a href=\"https:\/\/www.invensislearning.com\/siam-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">SIAM Foundation<\/a><\/i><i>,\u00a0<a href=\"https:\/\/www.invensislearning.com\/siam-professional-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">SIAM professional<\/a>,\u00a0<a href=\"https:\/\/www.invensislearning.com\/verism-foundation-certification-training\/\" target=\"_blank\" rel=\"noopener noreferrer\">VeriSM<\/a>,\u00a0etc.\u00a0<\/i><\/p>\n<div class='white' style='background:rgba(0,0,0,0); border:solid 0px rgba(0, 0, 0, 0); border-radius:0px; padding:0px 0px 0px 0px;'>\n<div id='sample_slider' class='owl-carousel sa_owl_theme owl-pagination-true autohide-arrows' data-slider-id='sample_slider' style='visibility:hidden;'>\n<div id='sample_slider_slide03' class='sa_hover_container' style='padding:0% 2%; margin:0px 0%; '><div style=\"text-align: center;\r\n \r\n    opacity: 1;\r\n    background-repeat: no-repeat;\r\n    background-size: cover;;\"  class=\"test-shine\">\r\n<a href=\"https:\/\/www.invensislearning.com\/siam-foundation-certification-training\/\" rel=\"bookmark\" title=\"SIAM Foundation Certification Training\" style=\"color:#fff\">\r\n<div class=\"td-module-meta-info SlideBox\" style=\"background:linear-gradient(0deg,#FAD384,#F39381 100%,rgba(0,0,0,0));text-align:center;padding:30px\">\r\n\r\n<div class=\"tdb-module-title-wrap\"><p class=\"entry-title td-module-title\"  style=\"    color: #fff;\r\n    font-size: 18px !important;\r\n    margin: 36px auto;\">\r\n\r\nSIAM Foundation Certification Training\r\n<\/p><\/div>\r\n<\/div>\r\n<\/a>\r\n<\/div><\/div>\n<div id='sample_slider_slide01' class='sa_hover_container' style='padding:0% 2%; margin:0px 0%; background-color:rgba(0, 0, 0, 0); '><div style=\"text-align: center;\r\n \r\n    opacity: 1;\r\n    background-repeat: no-repeat;\r\n    background-size: cover;;\" class=\"test-shine\">\r\n\r\n<a href=\"https:\/\/www.invensislearning.com\/itil-4-foundation-certification-training\/\" rel=\"bookmark\" title=\"ITIL 4 Foundation Certification Training\" style=\"color:#fff\">\r\n\r\n<div class=\"td-module-meta-info SlideBox\" style=\"background:linear-gradient(0deg,#AAC4E6,#4C73BE 100%,rgba(0,0,0,0));text-align:center;padding:30px;margin-bottom:0\">\r\n\r\n<div class=\"tdb-module-title-wrap\"><p class=\"entry-title td-module-title\"  style=\"    color: #fff;\r\n    font-size: 18px !important;\r\n    margin: 36px auto;\">\r\n\r\nITIL 4 Foundation Certification Training\r\n<\/p><\/div>\r\n<\/div>\r\n<\/a>\r\n<\/div><\/div>\n<div id='sample_slider_slide05' class='sa_hover_container' style='padding:0% 2%; margin:0px 0%; '><div style=\"text-align: center;\r\n \r\n    opacity: 1;\r\n    background-repeat: no-repeat;\r\n    background-size: cover;;\"  class=\"test-shine\">\r\n<a href=\"https:\/\/www.invensislearning.com\/siam-professional-certification-training\/\" rel=\"bookmark\" title=\"SIAM Professional Certification Training\" style=\"color:#fff\">\r\n<div class=\"td-module-meta-info SlideBox\" style=\"background:linear-gradient(0deg,#FAD384,#F39381 100%,rgba(0,0,0,0));text-align:center;padding:30px\">\r\n\r\n<div class=\"tdb-module-title-wrap\"><p class=\"entry-title td-module-title\"  style=\"    color: #fff;\r\n    font-size: 18px !important;\r\n    margin: 36px auto;\">\r\n\r\nSIAM Professional Certification Training\r\n<\/p><\/div>\r\n<\/div>\r\n<\/a>\r\n<\/div><\/div>\n<div id='sample_slider_slide04' class='sa_hover_container' style='padding:0% 2%; margin:0px 0%; '><div style=\"text-align: center;\r\n \r\n    opacity: 1;\r\n    background-repeat: no-repeat;\r\n    background-size: cover;;\"  class=\"test-shine\">\r\n<a href=\"https:\/\/www.invensislearning.com\/itsm-certification-courses\/\" rel=\"bookmark\" title=\"ITSM Certification Training Courses\" style=\"color:#fff\">\r\n<div class=\"td-module-meta-info SlideBox\" style=\"background:linear-gradient(0deg,#94FFF8,#5095EA 100%,rgba(0,0,0,0));text-align:center;padding:30px\">\r\n\r\n<div class=\"tdb-module-title-wrap\"><p class=\"entry-title td-module-title\"  style=\"    color: #fff;\r\n    font-size: 18px !important;\r\n    margin: 36px auto;\">\r\n\r\nITSM Certification Training Courses\r\n<\/p><\/div>\r\n<\/div>\r\n<\/a>\r\n<\/div><\/div>\n<div id='sample_slider_slide02' class='sa_hover_container' style='padding:0% 2%; margin:0px 0%; '><div style=\"text-align: center;\r\n \r\n    opacity: 1;\r\n    background-repeat: no-repeat;\r\n    background-size: cover;;\"  class=\"test-shine\">\r\n<a href=\"https:\/\/www.invensislearning.com\/verism-foundation-certification-training\/\" rel=\"bookmark\" title=\"VeriSM\u2122 Foundation Certification Training\" style=\"color:#fff\">\r\n\r\n<div class=\"td-module-meta-info SlideBox\" style=\"background:linear-gradient(0deg,#5EBDAE,#C1EA9E 100%,rgba(0,0,0,0));text-align:center;padding:30px\">\r\n\r\n<div class=\"tdb-module-title-wrap\"><p class=\"entry-title td-module-title\" style=\"    color: #fff;\r\n    font-size: 18px !important;\r\n    margin: 36px auto;\">\r\nVeriSM\u2122 Foundation Certification Training\r\n<\/p><\/div>\r\n<\/div>\r\n<\/a>\r\n<\/div><\/div>\n<\/div>\n<\/div>\n<script type='text\/javascript'>\n\tjQuery(document).ready(function() {\n\t\tjQuery('#sample_slider').owlCarousel({\n\t\t\tresponsive:{\n\t\t\t\t0:{ items:1 },\n\t\t\t\t480:{ items:2 },\n\t\t\t\t768:{ items:2 },\n\t\t\t\t980:{ items:2 },\n\t\t\t\t1200:{ items:2 },\n\t\t\t\t1500:{ items:2 }\n\t\t\t},\n\t\t\tautoplay : true,\n\t\t\tautoplayTimeout : 4000,\n\t\t\tautoplayHoverPause : true,\n\t\t\tsmartSpeed : 300,\n\t\t\tfluidSpeed : 300,\n\t\t\tautoplaySpeed : 300,\n\t\t\tnavSpeed : 300,\n\t\t\tdotsSpeed : 300,\n\t\t\tloop : true,\n\t\t\tnav : true,\n\t\t\tnavText : ['Previous','Next'],\n\t\t\tdots : true,\n\t\t\tresponsiveRefreshRate : 200,\n\t\t\tslideBy : 1,\n\t\t\tmergeFit : true,\n\t\t\tautoHeight : false,\n\t\t\tmouseDrag : false,\n\t\t\ttouchDrag : true\n\t\t});\n\t\tjQuery('#sample_slider').css('visibility', 'visible');\n\t\tsa_resize_sample_slider();\n\t\twindow.addEventListener('resize', sa_resize_sample_slider);\n\t\tfunction sa_resize_sample_slider() {\n\t\t\tvar min_height = '50';\n\t\t\tvar win_width = jQuery(window).width();\n\t\t\tvar slider_width = jQuery('#sample_slider').width();\n\t\t\tif (win_width < 480) {\n\t\t\t\tvar slide_width = slider_width \/ 1;\n\t\t\t} else if (win_width < 768) {\n\t\t\t\tvar slide_width = slider_width \/ 2;\n\t\t\t} else if (win_width < 980) {\n\t\t\t\tvar slide_width = slider_width \/ 2;\n\t\t\t} else if (win_width < 1200) {\n\t\t\t\tvar slide_width = slider_width \/ 2;\n\t\t\t} else if (win_width < 1500) {\n\t\t\t\tvar slide_width = slider_width \/ 2;\n\t\t\t} else {\n\t\t\t\tvar slide_width = slider_width \/ 2;\n\t\t\t}\n\t\t\tslide_width = Math.round(slide_width);\n\t\t\tvar slide_height = '0';\n\t\t\tif (min_height == 'aspect43') {\n\t\t\t\tslide_height = (slide_width \/ 4) * 3;\t\t\t\tslide_height = Math.round(slide_height);\n\t\t\t} else if (min_height == 'aspect169') {\n\t\t\t\tslide_height = (slide_width \/ 16) * 9;\t\t\t\tslide_height = Math.round(slide_height);\n\t\t\t} else {\n\t\t\t\tslide_height = (slide_width \/ 100) * min_height;\t\t\t\tslide_height = Math.round(slide_height);\n\t\t\t}\n\t\t\tjQuery('#sample_slider .owl-item .sa_hover_container').css('min-height', slide_height+'px');\n\t\t}\n\t\tvar owl_goto = jQuery('#sample_slider');\n\t\tjQuery('.sample_slider_goto1').click(function(event){\n\t\t\towl_goto.trigger('to.owl.carousel', 0);\n\t\t});\n\t\tjQuery('.sample_slider_goto2').click(function(event){\n\t\t\towl_goto.trigger('to.owl.carousel', 1);\n\t\t});\n\t\tjQuery('.sample_slider_goto3').click(function(event){\n\t\t\towl_goto.trigger('to.owl.carousel', 2);\n\t\t});\n\t\tjQuery('.sample_slider_goto4').click(function(event){\n\t\t\towl_goto.trigger('to.owl.carousel', 3);\n\t\t});\n\t\tjQuery('.sample_slider_goto5').click(function(event){\n\t\t\towl_goto.trigger('to.owl.carousel', 4);\n\t\t});\n\t\tvar resize_9851 = jQuery('.owl-carousel');\n\t\tresize_9851.on('initialized.owl.carousel', function(e) {\n\t\t\tif (typeof(Event) === 'function') {\n\t\t\t\twindow.dispatchEvent(new Event('resize'));\n\t\t\t} else {\n\t\t\t\tvar evt = window.document.createEvent('UIEvents');\n\t\t\t\tevt.initUIEvent('resize', true, false, window, 0);\n\t\t\t\twindow.dispatchEvent(evt);\n\t\t\t}\n\t\t});\n\t});\n<\/script>\n\n","protected":false},"excerpt":{"rendered":"<p>Information security describes the activities which are related to the protection of information and infrastructure assets against the risk of being misused, lost, disclosed, and damaged. Information Security Management (ISM) is a governance activity within the corporate governance framework. ISM describes the controls which are necessary to be implemented by an organization to make sure [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":14452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.7 (Yoast SEO v16.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Management Overview<\/title>\n<meta name=\"description\" content=\"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Comprehensive Overview of Information Security Management\" \/>\n<meta property=\"og:description\" content=\"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Invensis Learning Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/invensislearn\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-25T08:29:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T05:51:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1068\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:site\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristine Angela Millano\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\",\"name\":\"Invensis Learning\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/invensislearn\/\",\"https:\/\/www.instagram.com\/invensis_learn\/\",\"https:\/\/www.linkedin.com\/company\/invensis-learning\/\",\"https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ\",\"https:\/\/twitter.com\/InvensisElearn\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"width\":181,\"height\":47,\"caption\":\"Invensis Learning\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"name\":\"Invensis Learning Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg\",\"width\":1068,\"height\":552,\"caption\":\"Information security management in ITIL - invensis learning\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/\",\"name\":\"Information Security Management Overview\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage\"},\"datePublished\":\"2021-08-25T08:29:02+00:00\",\"dateModified\":\"2026-04-06T05:51:20+00:00\",\"description\":\"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"A Comprehensive Overview of Information Security Management\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\"},\"headline\":\"A Comprehensive Overview of Information Security Management\",\"datePublished\":\"2021-08-25T08:29:02+00:00\",\"dateModified\":\"2026-04-06T05:51:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage\"},\"wordCount\":1096,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg\",\"articleSection\":[\"Latest IT Service Management Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\",\"name\":\"Kristine Angela Millano\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"caption\":\"Kristine Angela Millano\"},\"description\":\"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/\"],\"url\":\"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security Management Overview","description":"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/","og_locale":"en_US","og_type":"article","og_title":"A Comprehensive Overview of Information Security Management","og_description":"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.","og_url":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/","og_site_name":"Invensis Learning Blog","article_publisher":"https:\/\/www.facebook.com\/invensislearn\/","article_published_time":"2021-08-25T08:29:02+00:00","article_modified_time":"2026-04-06T05:51:20+00:00","og_image":[{"width":1068,"height":552,"url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg","path":"\/home\/ubuntu\/dev\/blog\/invensislearning_blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg","size":"full","id":14452,"alt":"Information security management in ITIL - invensis learning","pixels":589536,"type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@InvensisElearn","twitter_site":"@InvensisElearn","twitter_misc":{"Written by":"Kristine Angela Millano","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.invensislearning.com\/blog\/#organization","name":"Invensis Learning","url":"https:\/\/www.invensislearning.com\/blog\/","sameAs":["https:\/\/www.facebook.com\/invensislearn\/","https:\/\/www.instagram.com\/invensis_learn\/","https:\/\/www.linkedin.com\/company\/invensis-learning\/","https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ","https:\/\/twitter.com\/InvensisElearn"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","width":181,"height":47,"caption":"Invensis Learning"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.invensislearning.com\/blog\/#website","url":"https:\/\/www.invensislearning.com\/blog\/","name":"Invensis Learning Blog","description":"","publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg","width":1068,"height":552,"caption":"Information security management in ITIL - invensis learning"},{"@type":"WebPage","@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage","url":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/","name":"Information Security Management Overview","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage"},"datePublished":"2021-08-25T08:29:02+00:00","dateModified":"2026-04-06T05:51:20+00:00","description":"Discover the essentials of information security management, its objectives, scope, and value in ITIL for effective data protection and risk management.","breadcrumb":{"@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.invensislearning.com\/blog\/information-security-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"A Comprehensive Overview of Information Security Management"}]},{"@type":"Article","@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#article","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage"},"author":{"@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5"},"headline":"A Comprehensive Overview of Information Security Management","datePublished":"2021-08-25T08:29:02+00:00","dateModified":"2026-04-06T05:51:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#webpage"},"wordCount":1096,"commentCount":0,"publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/information-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2021\/07\/An-overview-of-Information-Security-Management-in-ITIL-1068x552-1.jpg","articleSection":["Latest IT Service Management Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.invensislearning.com\/blog\/information-security-management\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5","name":"Kristine Angela Millano","image":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","caption":"Kristine Angela Millano"},"description":"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.","sameAs":["https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/"],"url":"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/"}]}},"_links":{"self":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/13915"}],"collection":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/comments?post=13915"}],"version-history":[{"count":18,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/13915\/revisions"}],"predecessor-version":[{"id":25666,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/13915\/revisions\/25666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media\/14452"}],"wp:attachment":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media?parent=13915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/categories?post=13915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}