From the back room to the boardroom – making IT security a business partner

In my previous post in this series, we discussed the more persistent type of defending we need to do. This ‘persistent defense’ model yields more valuable intelligence and a deeper level of understanding of the attackers.  It can help take the guess work out of attribution and attacker objectives.  But the ultimate question is: how can you use this intelligence to influence business decisions?

Read More