Course Summary
Get a summary of this course.
“When good people in any country cease their vigilance and struggle, then evil men prevail.” - Pearl S. Buck
Best practices
Though it might sometimes seem complicated, a solid InfoSec foundation can be built by implementing well-known security best practices. These can be broken down into individual controls and processes implemented in a phased approach. As they’re used, the three tenets of information security will be served:
-
Protect
-
Detect
-
Respond
If best practices are focused on and implemented effectively, an organization’s exposure to attacks can be significantly reduced.
Note: At an Enterprise Security webcast in November 2015, Microsoft CEO Satya Nadella summed up the ...