Build an Information Security Strategy
If you're already a member, click here to log in.
Major Business Pain Points
Recommendations
Key Points
The most successful information security strategies are:
Approach
Methodology and Tools
Executive Brief
Read the concise Executive Brief to find out why you should build an information security strategy and review the methodology.
1. Assess security requirements
Define the business and security goals of your security program and determine the organization’s security pressure risk overview.
2. Build a gap initiative strategy
Use the best-of-breed security framework to perform a gap analysis between current and target states and define security goals and duties.
3. Prioritize initiatives and build roadmap
Synthesize the gap analysis into a list of actionable security initiatives, and prioritize these based on cost, effort, security benefit, and alignment with business demands.
4. Execute and maintain
Learn to use the methodology to manage security projects on the go and identify resources that will help execute the strategy successfully.
Related content:
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.