© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_4

4. Security Intelligence Model

Jeremy Wittkop

(1)Boulder, Colorado, USA

Your cyber-security strategy must be built into your business strategy.

—Tom Ridge

The primary challenge facing executives and security leaders in businesses around the globe is integrating security teams and technologies with the business. It is often extremely difficult to integrate business strategies into cyber-security strategies. Over the years, I have worked with several solutions to bridge the gap between the business and the security teams, and successfully doing so has been a primary leading indicator of success for my clients. In order to explain and visualize ...

Get Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.