Top-Down Planning for Effective IT Security

Author(s): John Stehman

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Numerous enterprises have a corporate security policy, but it is not always referenced when IT selects end-to-end business application security measures. The application's overall importance is often overlooked as the IT staff focus on more technical concerns. Enterprises should consider the following recommendations to ensure appropriate security measures are selected and implemented.

  • Ensure IT complies with corporate security policy direction.
  • Establish the application's security based on its corporate importance.
  • Review the impact of a security breach with executives and legal counsel.

Effective business application security complies with corporate security policy, takes into account the application's importance, and considers any potential liability resulting from a security breach.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019