Technology Summary

Technology is the final component of your program, and it must be carefully architected and deployed for your program to be effective. Your security architecture must be tightly aligned with your business model to ensure that you are protecting the critical assets of the organization. Technology can be expensive to implement, and you cannot afford to waste this precious resource on areas that are not vital to the long-term success of the organization.

Armed with this information for the third component of your program, you are now ready to design the roadmap for your future information security program. It's important to strike a balance between the people, process, and technology components of your program. We will discuss ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.