Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

Author(s): Kate Wood

This phase will take you through the following activities:

  • Identifying customer expectations.
  • Value ranking your customers.
  • Impressing your customers with security.

Use this phase as part of the full blueprint, Satisfy Customer Requirements for Information Security.