Create a mapping of your current security capabilities against our best-of-breed security framework. In this phase, you will:

  • Perform a current and target state analysis.
  • Define gap initiatives that will allow you to achieve your security targets.

Use this phase as part of the full blueprint, Build an Information Security Strategy.

Also In

Build an Information Security Strategy

Tailor best practices to effectively manage information security.

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.