{"id":241,"date":"2013-08-31T12:51:00","date_gmt":"2013-08-31T12:51:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2013\/08\/31\/how-to-get-sufficient-funding-for-your-security-program-without-having-a-major-incident-repost\/"},"modified":"2013-08-31T12:51:00","modified_gmt":"2013-08-31T12:51:00","slug":"how-to-get-sufficient-funding-for-your-security-program-without-having-a-major-incident-repost","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/how-to-get-sufficient-funding-for-your-security-program-without-having-a-major-incident-repost\/","title":{"rendered":"How to get sufficient funding for your security program (without having a major incident) – Repost"},"content":{"rendered":"
I recently had another guest diary published<\/a> on the SANS<\/a> Internet Storm Center Diary<\/a>. I have enjoyed the material on the ISC site for many years and consider it an honor to contribute. I hope this is helpful information that you can use to secure sufficient funding for your security program in advance of your next security incident.<\/p>\n