Articles
Welcome to our articles page. You will find articles on various aspects of Information Security and Business Continuity promulgated here. This is done on an ongoing basis for free of cost for your education. We emphasize your cooperation to refrain from redistributing our content for commercial purposes without our prior written consent. However, you are free to use it for your personal (educational and research) purposes or to implement a certain roadmap or strategy in your organization.
We partner with CyAlpha — a Calgary-based Cyber consulting firm, to offer you the above services.
Developing Information Security Strategy: Conducting the analysis
In this article, we will outline the next step: the ANALYZE phase.
The goals of the ANALYZE phase are to:
Consolidate information from the IDENTIFY phase
Begin defining the InfoSec program objectives
Describe the problem statements,
Identify problem patterns
Gain sufficient insight to define the strategy
This helps us analyze the information we have gathered to gain enough insight to define our InfoSec strategy.
Developing Information Security Strategy: Conducting workshops and interviews
In this article, we continued discussing the workshop stage and outlined how to conduct interviews. We also discussed the importance of the trigger questions and gave you some sample outcomes for the customer jobs, pains and gains. In the next article, we will conclude the Identify phase by discussing the other aspects that are important to move to the next phase.