<!DOCTYPE html>
<html>
<head>
        <title>Information Security Management Complete Self-Assessment</title>
</head>
<body>
<style type="text/css">#aweber_rem {
              text-align:center;
              font-size:10px;
              color:#333;
              width:600px !important;
              margin:0px auto;
                    font-family:Verdana, Arial, Helvetica, san-serif;
              }
           #aweber_rem a {
              text-decoration:none;
              }
           #aweber_rem a:hover {
              text-decoration:underline;
              }
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
        <tbody>
                <tr>
                        <td style="padding-bottom: 5px; color: rgb(102, 102, 102);" valign="bottom" width="400">
                        <div style="font-size: 12px; text-align: right;"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span><br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g" target="_blank" title="Trouble viewing this email? ">Trouble viewing this email?</a></span></div>

                        <div style="font-size: 12px; text-align: right;"> </div>

                        <div style="font-size: 12px; text-align: center;"><br />
                        <br />
                         
                        <hr />
                        <p><span style="font-size:20px;"><span style="color:#000000;"><strong>Information Security Management Standard Requirements</strong></span></span></p>

                        <p><span style="color:#000000;"><span style="font-size:18px;">Crucial Requirements:</span></span></p>

                        <ol>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Has the organization demonstrated the use of sound information system and security engineering methodologies in integrating information technology products into the information system and in implementing the security controls contained in the security plan?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Does the organization have an effective process in place to report the security status of the information system and its environment of operation to the authorizing officials and other designated senior leaders within the organization on an ongoing basis?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Are authorizing officials conducting ongoing security authorizations by employing effective continuous monitoring activities and communicating updated risk determination and acceptance decisions to information system owners and common control providers?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Did the organization take the necessary remediation actions to address the most important weaknesses and deficiencies in the information system and its environment of operation based on the findings and recommendations in the security assessment report?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Has the organization tailored and supplemented the baseline security controls to ensure that the controls, if implemented, adequately mitigate risks to organizational operations and assets, individuals, other organizations, and the nation?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Has the organization supplemented the common controls with system-specific or hybrid controls when the security control baselines of the common controls are less than those of the information system inheriting the controls?</span></span></span><br />
                                 </li>
                                <li style="font-size: 16px; text-align: left;"><span style="font-size:14px"><span style="font-family:verdana"><span style="color:#000000">Is the organization effectively monitoring changes to the information system and its environment of operation including the effectiveness of deployed security controls in accordance with the continuous monitoring strategy?</span></span></span></li>
                        </ol>
                        <br />
                        <br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span></div>

                        <div style="text-align: center;">
                        <p style="text-align: left;"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img align="right" alt="" height="900" src="http://cdn5.bigcommerce.com/s-ilcoov/products/140882/images/167211/Information_Security_Management_FC__50980.1510779489.1280.1280.gif?c=2" style="margin:5px" width="600" /></a>   </span></span></p>
                        </div>

                        <div>
                        <p style="text-align: center;"><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>WHY OWN THE INFORMATION SECURITY MANAGEMENT SELF-ASSESSMENT?</strong></span></span></span></span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The Information Security Management Self-Assessment will make you a Information Security Management expert by:  </span></span></span></span></p>

                        <ul>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Reducing the effort in the Information Security Management work to be done to get problems solved</span></span></span></span><br />
                                 </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensuring that plans of action include every Information Security Management task and that every Information Security Management outcome is in place</span></span></span></span><br />
                                 </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Saving time investigating strategic and tactical options and ensuring Information Security Management opportunity costs are low</span></span></span></span><br />
                                 </li>
                                <li><u><em><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Delivering tailored Information Security Management advise instantly with structured going-forward plans</span></span></span></span></em></u></li>
                        </ul>
                        <span style="color:#000000"><span style="font-family:verdana"> </span></span></div>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img alt="" height="560" src="http://cdn6.bigcommerce.com/s-ilcoov/products/140882/images/167219/Information_Security_Management_RACI_Matrix__49275.1510779489.1280.1280.jpg?c=2" width="600" /></a></strong></span></span></span></span></p>

                        <hr />
                        <p style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:16px"><strong>SET NEW INFORMATION SECURITY MANAGEMENT STANDARDS OF EXCELLENCE</strong></span></span></span></span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">The Information Security Management Self-Assessment helps our clients create such high levels of Information Security Management value that they set new standards of excellence.</span></span></span></span></p>

                        <ul>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Ensures you don't miss anything: 882 criteria in 7 RDMAICS (Recognize, Define, Measure, Analyze, Improve, Control and Sustain) steps with easy and quick navigating and answering for 1 or up to 10 participants</span></span><br />
                                 </span></span></li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Shows your organization instant insight in areas for improvement: Auto generates reports, radar chart for maturity assessment, insights per process and participant and bespoke, ready to use, RACI Matrix</span></span><br />
                                 </span></span></li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Gives you a professional Dashboard to guide and perform a thorough Information Security Management Self-Assessment</span></span></span></span><br />
                                 </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Is secure: Ensures offline data protection of your Self-Assessment results</span></span></span></span><br />
                                 </li>
                                <li><em><u><span style="color:#000000"><span style="font-family:verdana"><span style="color:#000000"><span style="font-family:verdana">Dynamically prioritized projects-ready RACI Matrix shows your organization exactly what to do next</span></span></span></span></u></em></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img alt="" height="560" src="http://cdn6.bigcommerce.com/s-ilcoov/products/140882/images/167214/Information_Security_Management_Questionnaire__47607.1510779489.1280.1280.jpg?c=2" width="600" /></a></span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img align="left" alt="" height="471" src="https://cdn6.bigcommerce.com/s-ilcoov/products/139954/images/156216/Agile_UX_Radar_Chart_-_Process_Average__30666.1503262776.1280.1280.jpg?c=2" style="margin:5px" width="600" /></a></span><br />
                        <br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img align="right" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156251/Service_Level_Agreement_Participant_view__62705.1503431033.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></span><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img align="left" alt="" height="233" src="https://cdn6.bigcommerce.com/s-ilcoov/products/138692/images/156249/Service_Level_Agreement_Summary_responses__92019.1503431031.1280.1280.jpg?c=2" style="margin:5px" width="250" /></a></strong></span></span></span></p>
                        </td>
                </tr>
                <tr>
                        <td colspan="1">
                        <div style="text-align: left;">
                        <p style="text-align: center;"><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align: center;"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="font-size:16px"><strong>COST/BENEFIT ANALYSIS; INFORMATION SECURITY MANAGEMENT<br />
                        SELF-ASSESSMENT JUSTIFICATION AND APPROVAL TOOLS:</strong></span></span></span></span><br />
                         </p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Purchasing a The Art of Service Self Assessment will spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of criteria that will aid in gaining approval and give you the ability to validate and review your Self-Assessment investment:</span></span></span><br />
                         </p>

                        <ul>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Excluding hired consultants and advisors from top management consulting firms, internal Information Security Management Self-Assessment work is typically undertaken by senior level positions with titles such as Enterprise Architect, Business Process Architects, Business Process Re-engineering Specialists and Business Architects.</span></span></span><br />
                                 
                                <ul>
                                        <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Statistics according to Glassdoor and <a href="" https:="" jobs="" www.indeed.com="">Indeed</a> tell these positions receive an average basic pay of $125,000. Daily rates of basic pay are computed by dividing an employee's annual pay by <a computing-hourly-rates-of-pay-using-the-2087-hour-divisor="" fact-sheets="" href="" https:="" pay-administration="" pay-leave="" policy-data-oversight="" www.opm.gov="">260 days</a>. The daily salary is then derived by dividing the annual salary of $125,000 by 260 days = a daily rate of $480.</span></span></span><br />
                                         </li>
                                </ul>
                                </li>
                                <li><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana">Top management consulting firms <a how-much-do-top-management-consulting-firms-charge-clients-per-consultant="" href="" https:="" www.quora.com="">start at $2,000 a day</a>, with rates typically charged up to 40 hours per week.</span></span></span></li>
                        </ul>

                        <p><span style="color:#000000"><span style="font-family:verdana"> </span></span></p>

                        <p style="text-align: center;"><span style="font-size:18px"><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><strong>For a fraction of this the Self-Assessment will make you<br />
                        a Information Security Management domain authority.</strong></span></span></span></span></p>

                        <p style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/kQ6DJy9aNPc9L3l0b9amLw/pL91QpqEdkV5ZJG4cW8f8g"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span><br />
                        <br />
                        <br />
                         </span></span></p>
                        </div>

                        <hr />
                        <p style="text-align: center;"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/gS8ZQui67YPknvpm9mpwwg/pL91QpqEdkV5ZJG4cW8f8g" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>

                        <div style="text-align: center;">
                        <div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
                         </span></span></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/TRS7BBa0FBV3hqhWe1wrOg/pL91QpqEdkV5ZJG4cW8f8g"><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/itil-training-organization-newlogosmall.jpg" width="280" /><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/prince2-training-organization-newlogo-small.jpg" width="280" /></a></span><br />
                          </span></span>

                        <p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework:  <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/iCrBsyuzkfxfpU892oinYO763w/pL91QpqEdkV5ZJG4cW8f8g">https://www.nist.gov/cyberframework/industry-resources</a></p>
                        <span style="color:#000000"><span style="font-family:verdana">  </span></span>

                        <hr /></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>

                        <p> </p>
                        <span style="color:#000000"> </span></div>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px"> 
                        <p> </p>

                        <p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>

                        <p> </p>

                        <p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/pL91QpqEdkV5ZJG4cW8f8g" >Manage Subscription</a>  </p>

                        <p> </p>
                        </td>
                </tr>
        </tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/pL91QpqEdkV5ZJG4cW8f8g/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>