Information Security Roadmap Summary

The reality of building a comprehensive information security program is that you need to employ skilled people, implement processes that all people can adapt to their organizations, and back it up with effective technology. Everything must work together; without one of these pieces, you will not have a sufficient security program in place. One weak link in the information security triangle, and your program collapses. Whether you are the CEO, COO, or CIO, you represent the quality of your enterprise's security practice, and ultimately you will be responsible if there is a breach. Don't take that chance!

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.