This book contains a lot of material about information security, is replete with statistics, examples and money. The book provides step-by-step recommendations for protecting a company.
As in the previous parts, I focus on a systematic approach, avoiding the classic mistake of focusing on technology and expecting a miracle from them. The book shows how information security is related to processes, competencies, internal communication, lean manufacturing and project management.