CHAPTER 4: THE AUTHORIZATION PROCESS – ESTABLISHING A FOUNDATION

Typically in most global organizations, security is viewed at best as a necessary evil and more commonly as a necessary friction. This derives from security’s primary focus on attempting to constrain behavior to prevent negative events. Although well-intentioned, the inevitable result is that security practitioners are not viewed as enablers of innovation, but people preventing the business from doing what it needs to do.40

Bill Boni, Corporate Vice President, Information Security and Protection, Motorola

In this chapter:

Designing and implementing an effective security program Information systems security roles and responsibilities

40 “The Time is Now: Making Information ...

Get The Definitive Guide to the C Transformation Process now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.