Build an Information Security Strategy – Phase 2: Assess Gaps

Author(s): Kate Wood, Isaac Kinsella

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Create a mapping of your current security capabilities against our best-of-breed security framework. In this phase, you will:

  • Perform a current and target state analysis.
  • Define gap initiatives that will allow you to achieve your security targets.

Use this phase as part of the full blueprint, Build an Information Security Strategy.

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019