Verify Your Cyber Threat Strategy

A couple months ago, Matt Rosenquist posted a really interesting blog with a lot of great information on how a company can use ""

We decide to take this topic a bit further. We developed a presentation with the same questions but with links to resources. These resources provide ideas on how to develop a cyber threat strategy if your company doesn't have one, or if your answer is no to one or more of the questions.

<div style="width:425px" id="_ss_11453967"> <strong style="display:block;margin:12px 0 4px"><a href="" title="Verify Your Cyber Threat Strategy" target="_blank">Verify Your Cyber Threat Strategy</a></strong> <object id="_sse11453967" width="425" height="355"> <param name="movie" value="" /> <param name="allowFullScreen" value="true"/> <param name="allowScriptAccess" value="always"/> <param name="wmode" value="transparent"/> <embed name="_sse11453967" src="" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="425" height="355"></embed> </object> <div style="padding:5px 0 12px"> View more presentations from <a href="" target="_blank">IT@Intel</a> </div> </div>

As always, share with other security professionals and IT managers if you find this presentation useful.

Thanks, Elaine