About The Hague Security Delta
What's happening in the
Dutch Security Domain?
Linking IT-security policy, architecture ánd operations - taking vulnerabilities, threats and compliance into account - is not easy. And how do you subsequently prove to be in control of your IT-security?
In this Lunch & Learn session we guide you through the different steps in the ON2IT Security Framework.
- Policy: what are business requirements and risks? What's the use of a GAP-analyses. What are the priciples and how to audit?
- Architecture: Link the chosen policy and technical operation, using the IT-security architecture
- Operation: executing the set IT-security policy (eventmanagement, vulnerability management, incident management, compliance & reporting)
Register for this Lunch & Learn and learn about the added value of the ON2IT Security Framework for your organization.