In this chapter, we covered the modern threat landscape so that we can better support:
- The development of our information security program
- Support business/mission goals and objectives
- Develop countermeasures that defend against modern threats
We discussed:
- How to determine what is important to your organization
- Potential threats to your organization
- Types of hackers/adversaries
- Methods used by the hacker/adversary
- Methods of conducting training and awareness as it relates to threats
In the next chapter, we will discuss the activities necessary to establish an enterprise-wide information security program focusing on policies, procedures, standards, and guidelines.