In implementing a new network, would you see a gap analysis (between the existing security policies and procedures and the new network design) as a valuable exercise? If you think it's a good thing to do, for what reasons?
Many thanks for your replies
fanocle