Technology is an enabler, not a solution, for deploying and executing a sound information assets protection (IAP) strategy. Responsibility for executing IAP should be shared across the entity, making all employees accountable as part of a well defined and articulated information security risk management program. Derivatively, the IAP risk assessment objective is to enable recommendations maximizing confidentiality, integrity, and availability protection; while maintaining information functionality and usability. This objective addresses major risk management elements; therefore, key objective conveyance to and acceptance by an entity’s employees can increase the probability for an adequate IAP risk management program.
“View Part I of the Effective Employment Practices for Protecting IT series here“