O'Reilly logo

Principle Based Enterprise Architecture: A Systematic Approach to Enterprise Architecture and Governance by Ian Koenig

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 38 Hosting Security Responsibilities

Each Technology owner needs to have a designated security point of contact (which could be the technology owner herself).

A security point of contact understands how the group or unit uses technology along with the efficacy of local security controls. In working with leadership, they balance the need to secure the business with the need to run the business effectively.

These security points of contact form a virtual team that may be called to respond to security incidents affecting the entire company. Have a process for convening the team and dealing with company-wide security emergencies. Who owns managing an emergency of that scope? How is it handled if that person is on vacation? What is the internal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required