Magazine download

Results Chain for Information Security and Assurance

Based on the information gathered in your

    Requires Free Membership to View

security blueprint, you can develop the results chain model here to build a framework that will allow you to clearly identify and present the actions that will be taken to achieve an outcome.

This was first published in July 2008

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.