Information Security Existing Program Evaluation Summary Example
Program Component | Score | Comments |
---|---|---|
People | ||
| 7 |
|
| 8 |
|
| 9 |
|
People Score | 24 | |
Process | ||
| 10 |
|
| 9 |
|
| 7 |
|
Process Score | 26 | |
Technology | ||
| 6 |
|
| 10 |
|
| 10 |
|
Technology Score | 26 | |
Overall Average Rating ... |
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.