A. Protect
B. Identify
C. Detect
A. Step 3: Create a Current Profile
B. Step 1: Prioritize and Scope
C. Step 4: Conduct a Risk Assessment
A. Engage business and IT process owners for internal expertise.
B. Have management review and approve the gap analysis.
C. Engage external experts to perform a cost-benefit analysis.
A. Defining business cases
B. Evaluating business cases
C. Updating business cases
A. Through a risk based-approach
B. With a full project engagement to close all gaps
C. Comparing to and acting on the desired Tier level