Download now Free registration required
Building an effective security program for your organization requires a highly structured approach. This overview, written by Rich Schiesser, in conjunction with Harris Kern's Enterprise Computing Institute, lists fundamental steps you can follow to establish a framework that consists of an executive sponsor, a security process owner, review boards, and cross-functional planning teams. Once these roles are defined, you can inventory your current tools and policies and chart the goals, requirements, and priorities that will allow you to develop a comprehensive security strategy.Join the discussion of this download.
- Format: PDF
- Size: 66 KB