Information Security Roadmap
After you have determined the appropriate level of investment for your company, you can convert your selected strategic alternative into an information security roadmap.
Your roadmap should include the strategic initiatives that you expect to accomplish over the next couple of years in addition to plans to address any tactical issues.
You should closely monitor progress against your roadmap because your program will probably represent a major investment for your company, and you will want to ensure continued support from your management team. Table 7-6 provides an example of an information security roadmap.
Component | Strategic Initiatives | Time Frame | Tactical Plans | Time Frame |
---|---|---|---|---|
People ... |
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.