January 2016
Beginner
360 pages
10h 7m
English
This chapter describes the process that can be used each year to determine the successes and failures of the cyber security program and organization and a methodology that can be used to correct the failures and to plan for the upcoming years.
Read not to contradict and confute, nor to believe and take for granted, nor to find talk and discourse, but to weigh and consider
Francis Bacon1
Read now
Unlock full access