O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_1

1. The Problem We Are Facing

Jeremy Wittkop

(1)Boulder, Colorado, USA

A problem clearly stated is a problem half solved.

—Dorothea Brande

Have you ever sat in a boardroom directly after a cyber-attack? I have, and it is a terrible experience. Chief Executive Officers (CEOs), Chief Information Security Officers (CISOs), and Chief Information Officers (CIOs) silently shake their heads and stare out the window, wondering if their lives have been destroyed by this attack. What will happen to their organization in the following months? How many people will be laid off as a result? Too many hold their head in their hands contemplating the damage ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required