ABSTRACT

In Section I, we have relentlessly attacked the archives, files, libraries, and document management tools the company had in place in search of usable documentation that pertained to information security standards, policies, procedures, and/or guidelines. Now, we are going to take what we found and figure out whether we can use them, all or in part, or whether we need to start over.