Step 1 of 6
Identification
Your assets?
Your admins accounts?
Your applications?
Risks analysis?
IS audits?
A chief information security officer (CISO)?
A team ?