Corporate information security can be challenging due to the numerous avenues that an attacker can traverse. All companies need methods to secure the hardware, software, and communication channels of mobile systems, internal networks, email traffic, and so on. Before developing a method, managers should engage technical and nontechnical staff to answer the following question: “How do we store, process, and transmit data in a secure manner?” As we explore in this Executive Update, to answer this question effectively, you’ll need a teamwork process in place that engages many people who are not thought of as security experts.
Executive Update
Architectural Risk Assessment: Matching Security Goals to Business Goals
By Fred Donovan
Posted November 17, 2016 | Technology |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.