O'Reilly logo

The Definitive Guide to the C Transformation Process by Waylon Krush, Dr. Julie Mehan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: THE AUTHORIZATION PROCESS – ESTABLISHING A FOUNDATION

Typically in most global organizations, security is viewed at best as a necessary evil and more commonly as a necessary friction. This derives from security’s primary focus on attempting to constrain behavior to prevent negative events. Although well-intentioned, the inevitable result is that security practitioners are not viewed as enablers of innovation, but people preventing the business from doing what it needs to do.40

Bill Boni, Corporate Vice President, Information Security and Protection, Motorola

In this chapter:

Designing and implementing an effective security program Information systems security roles and responsibilities

40 “The Time is Now: Making Information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required