Information security and data protection
What has to be done
-
Identify security and data protection requirements, assess risks and design and implement measures to meet the requirements
-
Design the ISDP concept and document the outcomes on an ongoing basis
Tasks
Initiation | Concept | Implementation | Deployment |
---|---|---|---|
Outcomes
Initiation | Concept | Implementation | Deployment |
---|---|---|---|