
84 ◾ Information Security Management Handbook
Iterate to Dominate
e process of successive improvements over time is extremely powerful. is is the same basic
approach that underlies evolution, Agile software development, and the business strategy of
Kaizen. e basic structure of these processes is to take an initial state and improve it in successive
generations based on feedback, prioritizing improvements where they are most needed. e same
concept can be applied to an information security program.
e goal here is to have good security across the board. Do not put in Fort Knox security
in one area and none in another. Instead, get them all ...