Tag Archives: Information Security planning

Recently I described a process that I use with customers to help them make decisions about where to spend their money allocated to information security. That post explained how to identify projects, but it didn’t address how to prioritize those … Continue reading

Posted in IBM i Security, Info Security Mgmt | Tagged , , , , , | Leave a comment