Overview

The third and final step of the information security architecture methodology concentrates on developing your information security roadmap to the future. The first step you completed included analyzing your overall business requirements and serves as the framework for your program. During the second step, you evaluated the three components of your current architecture (people, process, and technology) and defined your desired future architecture. In the final step, you will use this information to evaluate alternative methods of achieving the goals for your future program.

You will continue your evaluation based upon the people, process, and technology components of your program. You need to balance these essential building blocks carefully ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.