Chapter 27. Summing Up the INFOSEC Evaluation Methodology

Introduction

Throughout this part of the book, you’ve learned about a methodology that is attempting to lay out a standard baseline for technical evaluations. If you’ve been in the business a while, it’s likely that none of the information was truly new to you. If you’re just getting into this type of work, you’ll want to keep in mind that all we’ve done is give you a new tool for your toolbox. Once the majority of information security consultants are beginning from the same square on the playing board, it will be easier for customers to understand what to expect when they request ...

Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.