Information Security Assessment Summary
The vital statistics of your information security program include the people, processes, and technology components of your program. By closely evaluating these areas, you will have a good idea of your current state and can begin to develop your improvement plan.
You can use the information security evaluation framework described in Chapter 3 to determine how effective your existing information security program is. You used this framework in Chapters 4, “People,” 5, “Process,” and “Technology,” to evaluate the people, processes, and technology components of your program. This framework is based upon 50 of the most important industry best practices for information security, and you can grade these elements ...
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.