Team Dynamics: Building a “Human System”

In the first half of this book, Chapters 1 to 5, we have presented the foundations of information risk management (Chapter 1), the profiles required by an IT security team (Chapter 2), the basic aspects that guide the team-individual contract (Chapter 3), a list of security principles to follow and activities to perform by the team (Chapter 4) and some techniques on how to organise their IT security activities (Chapter 5).