References

Accenture. 2012. Accenture Technology Vision 2012 . http://www.accenture.com/us-en/technology/technology-labs/Pages/insight-accenture-technology-vision-2012.aspx .

Ahamad, Mustaque. 2011. Georgia Tech Releases Cyber Threats Forecast for 2012 . Comment in Georgia Tech press release. http://www.scs.gatech.edu/content/georgia-tech-releases-cyber-threats-forecast-2012 .

Alexander, Aileen and Jamey Cummings. 2016. “The Rise of the Chief Information Security Officer.” People + Strategy 39:1.

Alperovitch, Dmitri. 2012. Comment in Georgia Tech Emerging Cyber Threats Report 2012. http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf .

Amabile, Teresa M., and Steven J. Kramer. 2011. “The Power of Small Wins.” Harvard ...

Get Managing Risk and Information Security: Protect to Enable, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.