Build an Information Security Strategy – Phase 2: Perform a Gap Analysis


Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Continue your development of a security strategy through an in-depth current state assessment of your organization.

  • Define your current security capabilities and maturity levels.
  • Review penetration test results to determine where vulnerabilities exist.
  • Define the target state for the organization’s security.
By the end of this phase, you will have a vision for where the organization is striving to be regarding different controls.

Hide Details

Search Code: 78554
Published: September 21, 2015
Last Revised: September 21, 2015

Related Content

GET HELP Contact Us
VL Methodology