Other Information Security Roles

For any information security program to be successful, it must be integrated into every aspect of the environment. Integration must include statement of work and responsibilities within the business environment, job descriptions, and how these will be audited and monitored.

Integrating Information Security into the Business Process

A primary task in assigning roles in the information security process is how information security integrates into the business environment. As part of that integration, jobs that support security through the processes should be defined. For example, one way to do this is to define a separation of duties and control over company assets by coordinating efforts with everyone, including ...

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.