Unformatted text preview: tions or unverifiable data Harden the target; place multiple barriers between the
adversary and enterprise information systems Be a good consumer—beware of vendors trying to sell
“single point solutions” for enterprise security problems The Golden Rules
The Building an Effective Enterprise Information Security Program Don’t be overwhelmed with the enormity or complexity of
the information security problem—take one step at a time
and build on small successes Don’t tolerate indifference to enterprise information
And finally… Manage enterprise risk—don’t try to avoid it! Thanks
Thanks Q A...
View Full Document
This document was uploaded on 01/14/2014.
- Winter '14
- Information Security