Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book "Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats". The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom.
Read More
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book "Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats". The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom.
Read Less