Abstract
The primary challenge facing executives and security leaders in businesses around the globe is integrating security teams and technologies with the business. It is often extremely difficult to integrate business strategies into cyber-security strategies. Over the years, I have worked with several solutions to bridge the gap between the business and the security teams, and successfully doing so has been a primary leading indicator of success for my clients.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Jeremy Wittkop
About this chapter
Cite this chapter
Wittkop, J. (2016). Security Intelligence Model. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2053-5_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2052-8
Online ISBN: 978-1-4842-2053-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)