This article is quite different from other articles published in basic training; rather than focus on a specific security-related technology, I want to focus on another important topic: how to be more effective as a security person.
Keywords :
security of data; software management; security person; security wall of data management; specific security-related technology; Data security; Management training; Mike Howard; Prioritization; Security; basic training; email;