Downloaded 42 times
Performing an Information Security Assessment
This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to support a security assessment? how to perform a gap analysis? how to create a security road map? - and discusses the lessons learnt.
Signup for Thought Leader
Get the latest IT management thought leadership delivered to your mailbox.
Our 100% โNO SPAMโ Guarantee
We respect your privacy. We will not share, sell, or otherwise distribute your information to any third party. Period. You have full control over your data and can opt out of communications whenever you choose.