Developing Your Information Security Program Summary

This chapter introduced the information security life cycle and reviewed a methodology that can be used to develop an information security program for your organization in approximately 90 days. The methodology begins with establishing the current state of your program, commonly called your “baseline,” and provides the steps required to develop a plan to reach your desired future state. We followed the first step of the methodology and reviewed the steps necessary to complete the business requirements analysis portion of your information security program.

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.