Key Points for This Chapter

  • It is important to take a comprehensive view of your information security program, as opposed to focusing on a particular problem area.

  • People, process, and technology are the essential components of an effective information security program.

  • People are the most difficult portion of your program because everyone from the CEO on down needs to play his part to ensure an effective program.

  • Security processes are the glue that binds the people and technology components of your program. The processes must be very clear for everyone in the organization to follow them.

  • Technology is often confusing and can sometimes establish a false sense of security in your organization.

  • User IDs and passwords are the most basic form of technology. ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.