Information Security Existing Program Evaluation Summary Example

Program ComponentScoreComments
People  
  • Strategy

7
  • No formal strategy exists today

  • Components

8
  • Staff focused on day-to-day firefighting

  • Administration

9
  • Minimal involvement of executive staff

People Score24 
Process  
  • Strategy

10
  • Informal policies that are not followed consistently

  • Components

9
  • Policies are not easily accessed by employees

  • Administration

7
  • All major security policies have been considered in program

Process Score26 
Technology  
  • Strategy

6
  • No technology architecture is in place, and changes are tactical in nature

  • Components

10
  • Major technology components have been deployed

  • Administration

10
  • Informal program to protect environments from security threats

Technology Score26 
Overall Average Rating ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.