O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_7

7. Assigning Accountability

Jeremy Wittkop

(1)Boulder, Colorado, USA

When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else.

—David Brin

I have spent a significant portion of my time since 2012 working with customers and speaking to audiences about the fact that Information Security is a business problem. Many executives were resistant to the idea because they did not want to be responsible for something they did not understand. Further, as long as senior executives could turn a blind eye to the problems presented by Information Security and simply fire their Chief Information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required