.
   

Bill_Murphy_Podcast_2016-02-18.png

 

 

6 Key Points

  1. Why top 10 lists for IT Security are useless
  2. How to add probability and possibility of events happening into your risk models
  3. How to present data that your board of directors will love
  4. How to develop range into your communication
  5. How to apply critical thinking, logic and Socratic methods to your analysis
  6. How to apply rigor in developing a defensible argument

 

 

.