Summary

In this chapter, we covered:

  • Integrating the user into cyber intelligence
  • Security awareness now and where it can go
  • Capability Maturity Model - security awareness

In the next chapter, we will learn more about the fate of Sandeep and friends as we discuss cyber intelligence and continuous monitoring!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.139.105.159