E&Y опубликовал результаты 15-го ежегодного исследования по информационной безопасности
Effective information security transformation does not require complex technology solutions. It requires leadership and the commitment, capacity and willingness to act.
http://www.ey.com/GL/en/Services/Advisory/...-gap---Overview
4 шага
1. Link the information security strategy to the business strategy, and the overall desired results for the business.
2.Start with a blank sheet when considering new technologies and redesigning the architecture, to better define what needs to be done. This presents an opportunity to break down barriers and remove existing biases that may hamper fundamental change.
3.Execute the transformation by creating an environment that enables the organization to successfully and sustainably change the way information security is delivered.
4.When considering new technologies, conduct a deep dive into the opportunities and the risks they present.
http://www.ey.com/GL/en/Services/Advisory/...-transformation
Effective information security transformation does not require complex technology solutions. It requires leadership and the commitment, capacity and willingness to act.
http://www.ey.com/GL/en/Services/Advisory/...-gap---Overview
4 шага
1. Link the information security strategy to the business strategy, and the overall desired results for the business.
2.Start with a blank sheet when considering new technologies and redesigning the architecture, to better define what needs to be done. This presents an opportunity to break down barriers and remove existing biases that may hamper fundamental change.
3.Execute the transformation by creating an environment that enables the organization to successfully and sustainably change the way information security is delivered.
4.When considering new technologies, conduct a deep dive into the opportunities and the risks they present.
http://www.ey.com/GL/en/Services/Advisory/...-transformation