A good place to start is to carry out an assessment of your existing security controls for each of the controls listed above, which will enable any gaps to be identified.Once the gaps have been identified, a roadmap of activities needed to close the gaps can be developed and implemented.
Do you have anything to add? Do you think anything is missing? Please let me know and share your comments!
John Clayton is an IT Management Consultant and Cybersecurity Specialist with more than 20 years’ experience in IT and Management Consulting, and with roles bridging Business and IT.
NNIT Security Insights is a regular column where prominent NNIT IT security advisors share their thoughts on current and future IT security challenges and how to deal with them.
NNIT has its own Cyber Defense Center. If lightning strikes, we have the necessary competencies in-house to respond and assist. We have also developed a range of services that can help businesses to achieve the right level of security protection to protect the business from financial and reputational damage.
You are welcome to contact us at email@example.com if you want to know more about how NNIT can help your business increase its information security level.