Define the company’s
Implementing a computer
security policy is a constructive step for the company.
What are the legal constraints ?
What are the security rules and
who do they apply to ?
How can we circulate best
rely on the standards in force (ISO 2700X, Ebios) when making recommendations
for best practice rules.
These rules guarantee
the different core business players comprehensible security specifications
according to their specific needs.