A great resource for executive management whether technical or not, this book provides easy-to-understand best practices for the strategies that companies should take to secure their IT networks.
While many leaders understand the importance of investing in cyber security, limited budgets and increased risk mean that security dollars must be spent wisely in order to maintain operations.
“All security controls are useless if it is ignored. Good security is usable security. Good security is adopted security.”Kim Crawley
While the 8 steps include technology, underlying all of these is the importance of instilling the cyber security mindset into your corporate culture. That is, security is everyone’s responsibility and security is not a product but a process that must be incorporated into everyday activities.