Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 1145

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 1149

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 1169

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 4482

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 4488

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /var/www/consultlocus.com/public_html/wp-content/plugins/gravityforms/common.php on line 4500
Security Strategy – Consultlocus
We help customers develop strategies for the digital age and identify the opportunities and threats that the digital transformation will bring to their industries.
 
This means that we help customers reinvent the digital age.

Our Approach

As-Is

  1. Identify current legal and regulatory requirements affecting information security.
  2. Identify drivers affecting the organization and their impact on information security.
  3. Identify current information security state.

To-Be

  1. Identify potential legal and regulatory requirements affecting information security.
  2. Identify To-Be information security state.
  3. Identify Gap between As-Is and To-Be.
  4. Develop an information security strategy aligned with business goals and objectives.
  5. Align information security strategy with corporate governance.
  6. Develop business cases justifying investment in information security.
  7. Obtain senior management commitment to information security.
  8. Define roles and responsibilities for information security throughout the organization.
  9. Establish internal and external reporting and communication channels that support information security.
Sun Tzu Strategy Without Tactics

Sun Tzu is regarded as one of the greatest military strategists. His documentation of the best ancient strategies are studied in boardrooms and war rooms alight. His timeless wisdom is very important in the age of cyber war.

“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.” – Sun Tzu

This is also relevant today especially in cyberwar and cyberdefense.