This was a question that I asked the audience during my presentation at today’s Information Systems Security Association (ISSA) meeting in Phoenix:
Related Posts:
Douglas Haider
My Computerworld Blog - "Cautiously Cutting the Cord"