Information security teams are charged with developing a protocol to protect the assets of an enterprise from constant threats and risks. Through the use of questionnaires, interviews, and assessments, this volume demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. It provides practical guidance for building, writing, and implementing policy architecture that is designed to specifically fit within that culture. Recognizing that the effectiveness of a policy is dependent on cooperation and compliance, the author also demonstrates how to communicate that policy and provides advice on how to gain support. Samples of effective policy architecture are included.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.