O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_3

3. Monetizing Risk

Jeremy Wittkop

(1)Boulder, Colorado, USA

In God we trust, all others bring data.

—W. Edwards Deming

Note

This chapter is specifically relevant to businesses that have a profit motive. Elements of this chapter may be applicable to not-for-profit organizations, but the concepts expressed in this chapter are specifically applicable to profit-driven enterprise .

The three most personally interesting subjects I have come across in my personal journey are history, politics, and business. I love history, in its truest form, because it is rooted in fact. Either things happened or they did not. Certainly, there are examples of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required