Check out the following resources for more information on the topics covered in this chapter:
- https://www.symantec.com/connect/blogs/top-5-priorities-proactive-cybersecurity
- https://www.fortynorthsecurity.com/
- https://www.stickman.com.au/reactive-cyber-security-approach-put-business/
- https://www.netfortris.com/blog/proactive-vs.-reactive-whats-your-network-security-strategy
- https://www.openaccessgovernment.org/reactive-mentality-on-cybersecurity/60036/
- https://www.ready.gov/business/implementation/IT
- https://www.disasterrecovery.org/
- https://www.accenture.com/t20170803T055319Z__w__/us-en/_acnmedia/PDF-7/Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf