April 2022
Intermediate to advanced
832 pages
28h 23m
English
WHICH VIEWPOINT IS THE best one to use when looking at your information security architecture, programs, policies, and procedures? If you're the end user, you might think it's the endpoints and apps that matter most. Senior managers and leaders might think it's the data that inform decisions in business processes from the strategic to operational levels and from long-range planning down to the transaction-by-transaction details of getting business done. Operations managers might emphasize core business processes as the right focal points for your security planning and attentiveness. Your chief finance officer, the purchasing and supply group, or your logistics support teams may see IT security ...