Articles

Welcome to our articles page. You will find articles on various aspects of Information Security and Business Continuity promulgated here. This is done on an ongoing basis for free of cost for your education. We emphasize your cooperation to refrain from redistributing our content for commercial purposes without our prior written consent. However, you are free to use it for your personal (educational and research) purposes or to implement a certain roadmap or strategy in your organization.

 

We partner with CyAlpha — a Calgary-based Cyber consulting firm, to offer you the above services.


InfoSec Strategy, Core Series Rhonald John Rose InfoSec Strategy, Core Series Rhonald John Rose

Developing Information Security Strategy: Conducting the analysis

In this article, we will outline the next step: the ANALYZE phase.

The goals of the ANALYZE phase are to:

  • Consolidate information from the IDENTIFY phase

  • Begin defining the InfoSec program objectives

  • Describe the problem statements,

  • Identify problem patterns

  • Gain sufficient insight to define the strategy

This helps us analyze the information we have gathered to gain enough insight to define our InfoSec strategy.

Read More
InfoSec Strategy, Core Series Rhonald John Rose InfoSec Strategy, Core Series Rhonald John Rose

Developing Information Security Strategy: Conducting workshops and interviews

In this article, we continued discussing the workshop stage and outlined how to conduct interviews. We also discussed the importance of the trigger questions and gave you some sample outcomes for the customer jobs, pains and gains. In the next article, we will conclude the Identify phase by discussing the other aspects that are important to move to the next phase.

Read More