Review your information security program
The following thoughts are offered as a mental checklist, as we too often get buried in goals, objectives and processes that are narrowly scoped. And isolated technology adventures often don't integrate to our enterprise requirements.