IT security strategy
implementation of an IT security strategy by an organization
Research a successful implementation of an IT security strategy by an organization. This can be an initial implementation or a series of corrections after a security breach.
Note
Provide an overview of what was done, including any unique aspects of the implementation. Include a URL that supports your research.