Professional Documents
Culture Documents
Security RoadMap
Security RoadMap
Security RoadMap
APPROACH
Our approach towards an effective information security program follows an iterative lifecycle
process that refreshes on an annual or quarterly basis to establish, implement, operate,
monitor, review, maintain, and improve information security.
The first step in the process is to develop the current state (see figure below). The results of
the security assessments and risk assessments (current infrastructure environment) are
analyzed. This stage will help us develop security risk profile of the organization