This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to support a security assessment? how to perform a gap analysis? how to create a security road map? - and discusses the lessons learnt.
This Performing an Information Security Assessment has been accessed 20 times.
Must Login To Download
Must Login To Download