Already a member? Sign In.
Need help? Our Trial Membership program will get you help on any IT project you're working on. You'll get access to our research, tools, advice and project help.
Security Policy & Process
Having trouble viewing this video? Progressive Download Mode
Tools may be shiny, but process handles the real work of IT security.
- Most enterprises pay too much attention to security tools, but these are only one component of good enterprise security.
- Solid security processes are as important as deployed solutions, if not more so, since tools generally support these processes.
- Policy, planning, staffing, training, and testing may not be sexy, but they’re essential for solid enterprise security.
I Need to:
Solution Road Map
Showing 1 of 1 Premium Resources: