ABSTRACT

Let us assume that what we have done to this point has been a smashing success and we are ready to begin the project to create and implement our information security awareness program. All we really need, then, is to spread the word and all will be well in the world. This should be a fairly simple task, after having found all the hidden previous work (if any), located the most amenable members of management, and begun to find out where the bones are buried.