Abstract
Most organizations rely on imperfect information technology (IT) to enable business and operational functions. These imperfections expose attractive perforations for some unauthorized users. Understanding what these users are after and what is critical to the business is vital for getting a handle on cybersecurity risk management. With that handle, a management approach may be put into place ...