Introduction
For more than 50 years, computers have aided in advancing humankind. As these devices have become more sophisticated, they have come under increasing attack from those looking to disrupt organizations using these systems. From the first boot sector virus to highly complex nation-state advanced persistent threats, the ability for an adversary to impact an organization negatively has never been greater. While the attacker has become more sophisticated, so has our ability to prepare for and defend against the attacker. To ensure that a company is adequately protected, we will go over what it takes to set up an information security program throughout this book.