Category: Building Secure Enterprises & Organizations

22.4 – Policy and Procedures

Forward-looking businesses exactly see technology and security as a resource. This resource can turn into a loss or accountability if not effectively secured. A security implementation plan is the first line of protection against security threats to enterprise resources. Strong…
22.3 – Baseline Analysis & Desired State

Perform and document a baseline analysis and evaluate the desired state Well, it is essential to perform and document the current state of security within the organization. Without this phase it is not possible to detect the gaps within the…
22.2 – Business Goals & Security

Identify the business goals associated with the security focus Understanding what is the business requirement is the main step in defining your enterprise security. Not taking a high-level vision of how security works together with the enterprise tends to lead…
22.1 – Scope and Approach

Well, there are many ways to have enterprise security. Deciding what your scope and approach are going to be is the primary step. With knowledge groups of your organization, you can formalize a process.  Here are guidance for this:  …
22.0 – Secure Enterprises & Organizations

Large organizations face more challenges compared to smaller enterprises. In a small enterprise, it’s common for the system administrator to be responsible for maintaining account administration, servers, network security and in their free time maintain the enterprise web presence. While…