How to Implement an Information Security Program

Contributed by Charles Hornat

This write-up is about my approach to Information Security and based on my own experiences. There are a number of ways to implement a program, but I believe that one has to first identify what they are protecting, understand the risks and associated threats, and then formulate a plan of protection.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet