Information Security Methodology
The information security life cycle illustrated in Figure 3-1 offers a broad overview to managing an effective information security program.
Figure 3-1. The information security life cycle.
The first step is to complete a thorough review of the current state of your information security program, which is referred to as a baseline assessment. This review will assist you in developing the plan for improving your program in the future.
After you have completed the baseline assessment, you are in the position to begin the second step in the process—making improvements. Evaluate the risks that currently exist in your ...
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.