Book Content
chapters • 19h28m total length
1. Introduction
2. What to Know About Threat Intelligence
3. Using Vulnerability Trends to Reduce Risk and Costs
4. The Evolution of Malware
5. Internet-Based Threats
6. The Roles Governments Play in Cybersecurity
7. Government access to data
8. Ingredients for a Successful Cybersecurity Strategy
9. Cybersecurity Strategies
10. Strategy Implementation
11. Measuring Performance and Effectiveness
12. Modern Approaches to Security and Compliance














