Performing an Information Security Assessment

This presentation describes the steps in performing an information security assessment - what are the critical security goals and objectives? what are the documentation requirements? how to incorporate regulatory requirements? how to gather data to support a security assessment? how to perform a gap analysis? how to create a security road map? - and discusses the lessons learnt.



Downloaded 42 times

Signup for Thought Leader

Get the latest IT management thought leadership delivered to your mailbox.

Mailchimp Signup (Short)
Cioindex No Spam Guarantee Shield

Our 100% โ€œNO SPAMโ€ Guarantee

We respect your privacy. We will not share, sell, or otherwise distribute your information to any third party. Period. You have full control over your data and can opt out of communications whenever you choose.

Find More References Like This