Downloaded 42 times
Performing an Information Security Assessment
This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to support a security assessment? how to perform a gap analysis? how to create a security road map? - and discusses the lessons learnt.
Don’t Miss These Related References:
- Information Security Governance Assessment Tool
- Comprehensive Overview of Information Security Governance: Aligning Strategy with Security
- Information Security Governance Guide: Building Risk-Aligned, Role-Driven Security Programs
- IT Security Self Assessment Guide
- e-Book: CIO's Guide to IT Security Strategy
Find More References Like This
Signup for Thought Leader
Get the latest IT management thought leadership delivered to your mailbox.
Our 100% “NO SPAM” Guarantee
We respect your privacy. We will not share, sell, or otherwise distribute your information to any third party. Period. You have full control over your data and can opt out of communications whenever you choose.