© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_2

2. Protecting Critical Assets

Jeremy Wittkop

(1)Boulder, Colorado, USA

If you think technology can solve your security problems, then you don’t understand the problems, and you don’t understand the technology.

—Bruce Schneier

Throughout the remainder of this book, we will operate under the central premise that every organization across the globe has too much information flowing throughout their environment for it to be feasible to monitor the content and context of everything that is transferred. Due to the volume of electronic information, should an organization choose to attempt monitoring of every transmission, half or more of the organization’s ...

Get Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.