In the previous chapter, we discussed a scenario in which a CISO was given a budget of $5 million to develop the cybersecurity program of a sneaker company. Our CISO has been given a very large task, but before they begin, they need to consider the objective of their security program. The objective may seem obvious, in fact, it is so obvious that it is rarely even considered ...
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. G. Oakley et al.Theoretical Cybersecurityhttps://doi.org/10.1007/978-1-4842-8300-4_77. Strategic Defensive Security
(1)
Owens Cross Roads, AL, USA
(2)
Arlington, VA, USA
(3)
Huntsville, AL, USA
Get Theoretical Cybersecurity: Principles and Advanced Concepts now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.