Create a mapping of your current security capabilities against our best-of-breed security framework. In this phase, you will:
- Perform a current and target state analysis.
- Define gap initiatives that will allow you to achieve your security targets.
Use this phase as part of the full blueprint, Build an Information Security Strategy.