Design of Your Future Security Processes

This section presents three major areas of information security processes: strategy, components, and administration. You will review best practices for each area, along with practical suggestions for implementing them at your company. The term process describes this overall component of your information security program, and policy describes individual elements such as security awareness.

All organizations have processes that define how they expect their employees to behave. Employees must report for work at a given hour and must work until their shift ends. Managers have guidelines that they must follow when counseling and disciplining employees that fail to follow these processes. Information security ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.