After my earlier this post about the SDIM project, several people on Twitter also asked me to do the same for the 80/20 Rule of Information Security project we completed several years ago.
It is a list of key security projects, their regulatory mappings, maturity models and such. Great for building a program or checking yours against an easy to use baseline.
Thanks for reading, and here is where you can learn more about the 80/20 project. Click here.
New Blog Post: 80/20 Rule of Information Security https://t.co/hskd7EqBJ1
80/20 Rule of Information Security – After my earlier this post about the SDIM project, several people on Twitt… https://t.co/8iTzEu4zs0
80/20 Rule of Information Security | MSI :: State of Security https://t.co/ktg8FeOJ9p
80/20 Rule of Information Security | MSI :: State of Security #infosec https://t.co/bPjwZ7tLlw