People—Architecture

Continuing with the information security framework that we used to evaluate your current program, we will now define your future architecture. The industry best practices that you reviewed in this section provided some examples of a highly effective information security organization. Now you need to decide upon the appropriate information security organization for your company.

You can use Table 4-4 to summarize your desired future people architecture along with the associated priorities and desired timeframe for each area of your program. By establishing the areas on which you would like to focus your attention, you can use this information to construct an information security roadmap that is tailored to your unique business ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.