Skip to main content

Security Intelligence Model

  • Chapter
  • First Online:
  • 1187 Accesses

Abstract

The primary challenge facing executives and security leaders in businesses around the globe is integrating security teams and technologies with the business. It is often extremely difficult to integrate business strategies into cyber-security strategies. Over the years, I have worked with several solutions to bridge the gap between the business and the security teams, and successfully doing so has been a primary leading indicator of success for my clients.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.northjersey.com/news/former-engineer-at-bergen-county-based-becton-dickinson-charged-with-stealing-trade-secrets-1.626124

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Jeremy Wittkop

About this chapter

Cite this chapter

Wittkop, J. (2016). Security Intelligence Model. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_4

Download citation

Publish with us

Policies and ethics