Technology—Strategy

Evaluating your existing information security architecture provides some indication of how well your staff has planned and implemented the technology component of your program. The dynamic nature of business and information security challenges requires that your organization update the information security architecture on a regular basis.

Does the existing technology architecture allow for planned growth? Expanding your business model to rely more upon Internet sales and distribution requires a much different strategy from traditional order fulfillment through retail stores.

Your architecture should also address the best practices of separating your environment into zones and layering your security. Digital zones enable your ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.