Process Summary

We examined guidelines for establishing and enforcing information security processes at your company, along with relevant industry best practices. It's important to reiterate that employees generally do not like to be constrained; establishing processes is a balancing act between maximizing staff productivity and ensuring that an embarrassing security incident doesn't occur.

You must put metrics in place to monitor the progress of your program because you will make considerable investments in this area and it is important to demonstrate results. Next, you will move on to the third element of your program that you will use to enforce policies within your program: technology.

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.