Introduction

Developing an information security program requires the right combination of people, processes, and technology solutions to ensure that your enterprise environment is secure. Your staff administers the program and develops processes to guide personnel in security-related matters. By leveraging existing technologies, you can develop a layered security strategy, also known as defense in depth. Understanding and evaluating these components enables you to develop an effective security program for your organization.

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.