[Log In] []

Exploring the science and magic of Identity and Access Management
Thursday, January 17, 2019
 

The Business Justification for Data Security

Information Security
Author: Mark Dixon
Wednesday, March 7, 2012
12:23 pm

Recently, Jack Crail and I gave a joint presentation at the SecurePhoenix event sponsored by (ICS)2, the folks who oversee the CISSP certification.

SecurityJustification

Our presentation was based on a whitepaper entitled “The Business Justification for Data Security,” published by Securosis, which outlined a five step process for evaluating data security investments, mapping the potential investment to business needs and building a business justification case.

More to come as I explore some of these topics …

Technorati Tags: ,

Comments Off on The Business Justification for Data Security . Permalink . Trackback URL
 

Comments are closed.

Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.