Executive Summary

Security Strategy -- Who Does What To Whom When

Posted December 31, 1998 | Leadership |

Many companies find that security is one of the areas most difficult to align with business strategy. Why is it so tricky? Because it's new technology applied to new (and therefore not well-understood) requirements that are constantly changing. How many distributed applications did you have five years ago? How many e-commerce applications did you have last year?

About The Author
Steve Andriole
Stephen J. Andriole is a Fellow with Cutter Consortium, a member of Arthur D. Little's AMP open consulting network, and the Thomas G. Labrecque Professor of Business Technology at Villanova University. His specialty areas include digital transformation, emerging technology trends, cloud computing, social media, technology due diligence, software IP valuation, business technology strategy, business technology management, technology governance,… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.