v
Contents
Pr e f a c e ix
a
c k n o w l e d g m e n t s xvii
I
n t r o d u c t I o n xix
a
u t h o r xxxvii
1se c t I o n Pe o P l e a n d Bl a m e
1ch a P t e r wh o m do Yo u Bl a m e ? 3
e Buck Stops at the Top? 3
Managers and eir Loyal Secretaries 5
Information Security Spending—Driving Factors in the Wild 7
Do Top-Level Managers Care about Information Security? 10
Ignoring the Signs 12
Summary 14
2c
h a P t e r th e ha c k e r s 17
Hat Colors and Ethics 17
“Hacker” Dened 20
Zen and the Art of Remote Assessment 25
e Hacker through the Looking Glass 29
Communication, Hyper-Casual Fridays, and “Maturity” 35
Hacker Cries Wolf 38
Unmuzzled Hackers and Facebook 40
Summary 42
3c
h a P t e r ch e c k l I s t s a n d st a n d a