In this chapter, we discussed the critical activities required to establish an enterprise-wide information security program, focusing on executive buy-in, policies, procedures, standards, and guidelines.
In this chapter, you learned:
The planning concept related to information security program establishment
Success factors for information security program success
Information security program integration into organizational processes
Maturity concepts related to information security program planning
Policies, procedures, standards, and guidelines
In the next chapter, we will be covering the concepts of information security risk management. We will be discussing who has the responsibility for risk ownership within the organization and how to perform a risk assessment.