A practical playbook for securing mission-critical information
Steve Durbin
- Published
- Cybersecurity, Technology

Every organisation depends on a small set of information assets it cannot afford to lose. Identifying these “crown jewels” and protecting them with disciplined governance, clear ownership and targeted controls is the foundation of modern resilience, writes Steve Durbin, Chief Executive of the Information Security Forum (ISF)
Organisations spend billions on cyber tools, yet most breaches that matter occur because teams have not agreed what they are actually defending. “Crown jewels” is not marketing jargon; it is a disciplined way to identify the handful of information assets whose loss would materially damage the business. If you treat everything as critical, then nothing is. If you can name and own the few assets that drive revenue, reputation, regulatory compliance, or core operations, you can focus on resources where they change outcomes.
I like to define a company’s “crown jewels” as mission-critical information assets—data, processes, and the systems that enable them—where confidentiality, integrity, or availability failures would cause severe financial loss, regulatory sanction, or existential reputational harm. The definition must come from the business, not the security team. Ask executives: which assets could stop us operating for days, sink customer trust, or trigger fines in the tens of millions? Their answers should drive classification.
Start with discovery and impact-based classification
You cannot protect what you have not identified. Perform targeted discovery to map data flows and dependencies for core processes: customer transactions, billing, manufacturing controls, intellectual property, or high-risk personal data. Classify assets by business impact—financial, operational, reputational, and regulatory—and isolate the small set that is truly mission-critical.
This is not a one-off exercise. Crown jewels evolve as products change, acquisitions complete, or regulatory regimes shift; schedule reassessments at major business milestones.
Assign clear ownership and decision rights
Every crown jewel needs a named business owner and a technical steward. The business owner decides acceptable downtime, recovery priorities, and risk appetite. The technical steward translates those business decisions into architecture, controls, and recovery playbooks.
Without clear accountabilities, protection becomes an afterthought and response decisions disperse across teams during crises.
Make governance proportional and pragmatic
Governance is not a paperwork exercise but the mechanism that enforces investment prioritisation. A governance forum that includes senior stakeholders from the business, security, IT, and legal must sign off on what counts as a crown jewel. Budgets and roadmaps should be driven by that forum.
When compromises are necessary, they should be explicit and traceable to a risk decision, not implicit defaults that expose the business.
Apply controls that reduce business impact
Prioritise segmentation, least privilege, strong authentication, and encryption where they reduce actual exposure. Network segmentation and micro-segmentation limit the blast radius. Multi-factor authentication and certificate hygiene protect identity.
Anomaly detection around crown-jewel environments provides early warning; logging without context is noise. Above all, design for recoverability: air-gapped or immutable backups, tested restoration procedures, and recovery runbooks that assume the worst.
Culture is the multiplier
Technical controls fail when people do not understand their role in protecting the business. Translate the value of crown jewels into everyday behaviours. Ask who must approve data exports. Which processes require privileged checks?
Make secure habits measurable by including relevant KPIs in operational reviews, tabletop exercises, and leader performance objectives. Training should be concise, role-specific, and tied to scenarios that matter to the business.
Test relentlessly
Recovery plans are only a hypothesis until they are validated. Regular, scenario-based exercises, from tabletop through full failover, reduce guesswork and reveal hidden dependencies.
Test incident escalation paths with business owners in the loop so they practice decision-making under pressure.
Be economical and transparent with investments
Not every dataset requires the same level of protection. As Greg Neville from Towerwall said, “Don’t lock up peanut butter in Fort Knox.” Leaders must decide what is worth the investment and what can tolerate residual risk.
That decision should be traceable: documented risk acceptance, costed mitigation options, and a plan to revisit the choice. This discipline prevents unfocused security spending and ensures scarce resources protect what matters.
Measure what matters
Move beyond compliance checkboxes to metrics that reflect business resilience: mean time to detect and recover for crown-jewel assets, successful restoration rate in tests, and the proportion of crown-jewel systems covered by the protection baseline.
Report those metrics to the board in business terms: potential downtime cost, customer impact, and regulatory exposure.
Final note on change and vigilance
The crown jewels in 2025 will not be the same in 2027. Cloud migrations, AI models, data monetisation strategies, and regulatory attention reshape risk factors quickly. Treat classification and protection as continuous programmes, not projects with a finish line.
Protecting the crown jewels is a leadership problem more than a technology problem. Security teams provide expertise and controls; business leaders decide priorities, accept or transfer risk, and enforce discipline. When the business clearly defines what it cannot afford to lose and aligns governance, controls, culture, and testing around that definition, enterprise resilience is sure to follow. Start small, be rigorous, and keep the business at the centre of every security decision.
Key takeaways
- Get senior leadership buy-in. Executives are best placed to identify critical processes.
- Consider the full range of potential threats. It’s not just the hackers you need to worry about.
- Take all relevant measures to control and mitigate threats. Think about people and process, not just technology.

Steve Durbin is Chief Executive of the Information Security Forum (ISF), an independent association that addresses major challenges in information security and risk management for organisations across the Fortune 500 and Forbes 2000. He is a frequent speaker on the Board’s role in cybersecurity and technology.
Further information
To find out more, visit securityforum.org
READ MORE: ‘ISF warns geopolitics will be the defining cybersecurity risk of 2026‘. Geopolitics is set to become the dominant cybersecurity risk of 2026, the Information Security Forum warns, as nation states intensify digital espionage and pressure on critical infrastructure — and even paper back-ups regain importance as a last line of defence when systems fail.
Do you have news to share or expertise to contribute? The European welcomes insights from business leaders and sector specialists. Get in touch with our editorial team to find out more.
Sign up to The European Newsletter
RECENT ARTICLES
-
UK organisations still falling short on GDPR compliance, benchmark report finds -
A practical playbook for securing mission-critical information -
Cracking open the black box: why AI-powered cybersecurity still needs human eyes -
Tech addiction: the hidden cybersecurity threat -
Parliament invites cyber experts to give evidence on new UK cyber security bill -
ISF warns geopolitics will be the defining cybersecurity risk of 2026 -
AI boom triggers new wave of data-centre investment across Europe -
Make boards legally liable for cyber attacks, security chief warns -
AI innovation linked to a shrinking share of income for European workers -
Europe emphasises AI governance as North America moves faster towards autonomy, Digitate research shows -
Surgeons just changed medicine forever using hotel internet connection -
Curium’s expansion into transformative therapy offers fresh hope against cancer -
What to consider before going all in on AI-driven email security -
GrayMatter Robotics opens 100,000-sq-ft AI robotics innovation centre in California -
The silent deal-killer: why cyber due diligence is non-negotiable in M&As -
South African students develop tech concept to tackle hunger using AI and blockchain -
Automation breakthrough reduces ambulance delays and saves NHS £800,000 a year -
ISF warns of a ‘corporate model’ of cybercrime as criminals outpace business defences -
New AI breakthrough promises to end ‘drift’ that costs the world trillions -
Watch: driverless electric lorry makes history with world’s first border crossing -
UK and U.S unveil landmark tech pact with £250bn investment surge -
International Cyber Expo to return to London with global focus on digital security -
Cybersecurity talent crunch drives double-digit pay rises as UK firms count cost of breaches -
Investors with €39bn AUM gather in Bologna to back Italy’s next tech leaders -
Axians and Nokia expand partnership to strengthen communications infrastructure across EMEA

























