O'Reilly logo

Assessing Information Security: Strategies, tactics, logic and framework by Andriej Michajlowski, Konstantin Gavrilenko, Andrew Vladimirov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7: PRESENTING THE OUTCOME AND FOLLOW-UP ACTS

The comprehensiveness of adaptive movement is limitless.’ – Mei Yaochen

As emphasised in the closing part of the previous chapter, properly presenting information security assessment results is essential for the overall success. Which tangible outcome does the company or organisation expect from the security audit performed? First of all is the assessment report. Beyond this, the accompanying presentations and debriefs are likely to be requested. In addition, assistance from the auditors can be called for during the assessment follow-up. After all, the ones who have offered the remedial advice are expected to be the experts in all the suggested remedies. There is no point in recommending ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required