© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_3

3. Monetizing Risk

Jeremy Wittkop

(1)Boulder, Colorado, USA

In God we trust, all others bring data.

—W. Edwards Deming

Note

This chapter is specifically relevant to businesses that have a profit motive. Elements of this chapter may be applicable to not-for-profit organizations, but the concepts expressed in this chapter are specifically applicable to profit-driven enterprise .

The three most personally interesting subjects I have come across in my personal journey are history, politics, and business. I love history, in its truest form, because it is rooted in fact. Either things happened or they did not. Certainly, there are examples of ...

Get Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.