.
6 Key Points
- Why top 10 lists for IT Security are useless
- How to add probability and possibility of events happening into your risk models
- How to present data that your board of directors will love
- How to develop range into your communication
- How to apply critical thinking, logic and Socratic methods to your analysis
- How to apply rigor in developing a defensible argument
.