Chapter 6. Developing Radar
Every company that positions security technology within its business units has two critical areas of consideration:
The parts that are controllable: the systems and security technology itself
The parts that are uncontrollable: threats that are flowing into your systems
Threats—perceived and real—constantly try to enter (ping) your system. What do they mean? It is impossible to understand a ping unless you can see it, correlate it to millions of other pings, and feed that ping (if it is a serious threat) through to a common reporting point that I advocate should be constructed like a dashboard, converting technical data into business vocabulary in real time. I call this developing radar.