SecurityAnalysis

And enterprise information systems be a good

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: tions or unverifiable data Harden the target; place multiple barriers between the adversary and enterprise information systems Be a good consumer—beware of vendors trying to sell “single point solutions” for enterprise security problems The Golden Rules The Building an Effective Enterprise Information Security Program Don’t be overwhelmed with the enormity or complexity of the information security problem—take one step at a time and build on small successes Don’t tolerate indifference to enterprise information security problems And finally… Manage enterprise risk—don’t try to avoid it! Thanks Thanks Q A...
View Full Document

Ask a homework question - tutors are online