Information Security Gap Analysis Example
Component | Current Score (0–2) | Desired Future Score (0–2) | Priority (High, Medium, Low) | Desired Time Frame | Comments |
---|---|---|---|---|---|
People | |||||
| 7 | 12 | High | 12 months |
|
| 8 | 10 | Medium | 18 months |
|
| 9 | 10 | Low | 24 months |
|
People Summary | 24 | 32 | |||
Process | |||||
| 10 | 12 | High | 12 months |
|
| 9 | 12 | Low | 24 months |
|
| 7 | 8 | Low | 18 months |
|
Process Summary | 26 | 30 | |||
Technology | |||||
| 6 | 8 | Medium | 12 months |
|
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.