O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_8

8. Shifting the Paradigm

Jeremy Wittkop

(1)Boulder, Colorado, USA

Usually the first problems you solve with the new paradigm are the ones that were unsolvable with the old paradigm.

—Joel A. Barker

There are many dangerous precedents in Information Security that need to be changed in order for organizations to be more successful in securing their most Critical Information Assets . There is danger in continuing to do things a certain way simply because that is the way it has always been done. Often, these precedents are reinforced despite the fact that an examination of their efficacy would suggest a change is necessary. There are also ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required