Results Chain for Information Security and Assurance

Based on the information gathered in your security blueprint, you can develop the results chain model here to build a framework that will allow you to clearly identify and present the actions that will be taken to achieve an outcome.
This was first published in July 2008

Dig Deeper

PRO+

Content

Find more PRO+ content and other member only offers, here.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close