In an ER when a new patient presents, doctors need to quickly assess the patient’s health and determine what needs to be done. Their survey checklist of mental state, airway, … Read More
Establishing an effective security organization is always a challenge. Clearly defined responsibilities and scope of authority for security organizations vary widely across different companies and industries. To help address this … Read More
This book is intended for those consumers who want to protect their security and privacy from all the threats that the internet brings, and are wanting more something more effective than the consumer-grade protection that most people get with their internet router/WiFi.
par·a·digm a typical example or pattern of something; a model. Why is information security so broken? As the countless breaches in the news illustrate, something is seriously wrong with how … Read More
In Part One, I cover Strategic & Tactical risk management, what it is and how to perform it. The objective is that by the end of Part One, you will … Read More
Introduction Background on me, why I am writing this book and how it will be developed and released online. Part One. Strategic & Tactical Risk Management This section discusses strategic … Read More
The purpose of the information security function is to protect the business and its brand from cyber threats. Why this book I have been working in the Information Security field … Read More