In this chapter, we covered:
- Integrating the user into cyber intelligence
- Security awareness now and where it can go
- Capability Maturity Model - security awareness
In the next chapter, we will learn more about the fate of Sandeep and friends as we discuss cyber intelligence and continuous monitoring!