1. Don't deploy technology without business context. Technology on a network with no business context will only indict you in a breach.
2. Drive your program from external industry experts 1/
5. It's all about priorities and focus. We were looking at point security solutions vs. overall enterprise. 4/
8. Work with the org. "If you're a stone, the stream will go around you." 6/
10. Don't be a gatekeeper to the risk register. Let anyone add items, then understand why. /FIN