Use the activities in this phase to:
- Create a plan to develop stakeholder relationships.
- Evaluate your current security processes and technologies, and create a plan to close any existing gaps.
Use the activities in this phase to:
Find a strategic and security-focused champion for your business.