O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_2

2. Protecting Critical Assets

Jeremy Wittkop

(1)Boulder, Colorado, USA

If you think technology can solve your security problems, then you don’t understand the problems, and you don’t understand the technology.

—Bruce Schneier

Throughout the remainder of this book, we will operate under the central premise that every organization across the globe has too much information flowing throughout their environment for it to be feasible to monitor the content and context of everything that is transferred. Due to the volume of electronic information, should an organization choose to attempt monitoring of every transmission, half or more of the organization’s ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required