Download now Free registration required
A holistic, information-centric security strategy takes people, process and technology into account and has a feedback mechanism. It is not enough to establish policy; actual insider behavior must be measured and tracked against established policy in order to keep security aligned with the business and in turn, to minimize information risk and maximize reward.
- Format: PDF
- Size: 658.4 KB