What is Security?1
Information vs. Operational Security 
Kickstarting Your Security Program2
When to Start Thinking About Security 
Getting Buy-In and Support from Leadership 
Event Emitters and Streams 
The Importance of Security Culture3
Instilling Healthy Security Culture 
Practices of Security Culture 
Your First Security Hire4
Your Job Description is Terrible 
The Skillset You're Looking For 
Setting Them Up For Success 
Prioritizing the Work5
Fibonacci Scale & The Eisenhower Matrix 
Level of Effort vs. Level of Impact 
Turning off Easy Mode 
Workload Management with Issue tracking6
Ranking Issues 
Remove Obstacles 
A Data-Driven Security Program7
Making Data Presentable 
Terrible Data Examples (and Some Good Ones) 
Metrics Aren't Goals 
Leveraging Security Frameworks8
How A Security Framework Will Help 
Choosing a Security Framework 
Establishing a Baseline 
Regulation and Compliance9
Keeping Up With New Rules 
Business Case for Compliance 
Tracking Vulnerabilities10
CVE: Common Vulnerabilities and Exposures 
Vulnerabilities Workflow 
Planning Your Security Budget11
Your First Year 
Example Budgets 
Responding to Incidents12
Goals of Incident Response 
Conducting Post-Mortems 
Threat Modeling13
Methodologies and Techniques 
The Worst Case Scenario 
Effective Bug Bounty Programs14
What Similar Companies are Doing 
The Skillset You're Looking For 
Comparison of Bug Bounty Service Providers 
Security Audits	& Penetration Tests15
When should I get a security review? 
Finding reputable researchers & consultants 
Least Privilege & Access Controls16
Onboarding & Offboarding 
Layered Security with MFA 
Monitoring & Alerting17
Smoke Alarms and Monitoring 
Modern Infrastructure for Monitoring