This is the second part of a series on designing security programs. The last article shared some security event stats from different industry sources, showing a clear need for a focused approach to ...