General discussion


DOWNLOA The 12 steps to designing a strategic security process

By JodyGilbert ·

After you take a look at this download, please post your feedback, ideas for improvements, or further thoughts on this topic.

--The TechRepublic Downloads Team

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

Ideal is good, but practical is better

by barbis In reply to DOWNLOAD: The 12 steps to ...

The article hits the high points of planning, but falls a little short for me.

These steps are chiefly useful to a new organization that is just organizing itself from a goverance standpoint. While a good overview, recommendations like these rarely address the chief problems faced by organizations who are trying to hammer entrenched cultures and technologies into some reasonable facimile of security best practice.

The fault lies with the approach: recommendations like thses assume security is a "new" organizational problem, when in fact it is an old problem that has simply been elevated to new priority. How to change their current security practices toward best preactices is more what companies need instruction in, I think, than just the ideal basics overview.

Bar Biszick-Lockwood

Related Discussions

Related Forums