The process for setting scope
– Dr. Richard Perez, vCISO
So, now that you understand why we are approaching it this way and what factors are driving this (both from an enterprise cybersecurity architecture viewpoint as well as in an application context), the next step is to outline a process or recipe that we can follow to make it happen.
Before we get into the details, we should point out that we’re in a little bit of a catch-22 situation when it comes to scope. On the one hand, until we can...