Thank you for voting Crowdsignal Logo

What is your assessment of DoD’s published strategy?

  •  
     
  •  
     
  •  
     
  •  
     
  •  
     
  •  
     
Total Votes: 338
1 Comment

  • William McMahon - 15 years ago

    Appears to be just a continuation of current policy of waiting until data is stolen before trying to close the breach rather than making sure that the data is not vulnerable in the first place, i.e., too much defense not enough offense in the approach. Don’t wait until the horse is stolen to close the barn door.

Leave a Comment

0/4000 chars


Submit Comment

Create your own.

Opinions! We all have them. Find out what people really think with polls and surveys from Crowdsignal.