Results Chain for Information Security and Assurance

Based on the information gathered in your security blueprint, you can develop the results chain model here to build a framework that will allow you to clearly identify and present the actions that will be taken to achieve an outcome.
This was first published in July 2008

Dig deeper on Business Management: Security Support and Executive Communications

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close