Taylor, first and foremost I would like to say that enjoyed reading your case study and I thought you did a really good job on it. In your introduction you displayed the importance of cyber security by providing the IBM statistics showing the financial impact of a data breach. I also like how you used the the Sony data breach of 2011 as an example of how damaging such an attack can be; although it is currently believed that Anonymous was not behind that attack. I thought your thesis statement at the end of your introduction was spot-on; it was concise and reiterated the significance of cyber security in the business world. Your definition of cyber security was accurate and cited correctly. You made a good point when you mentioned that cyber security functions to protect the confidentiality, integrity, and availability of a system; although I felt that you could have elaborated more on the CIA model and how it lays the foundation for cyber security. I like how you quoted Donaldson stating that “Threats may be natural or man-made, accidental or deliberate, random or deterministic”; this accurately conveys how intricate the issues of cyber security can be. You did a good job explaining the importance of the role people play in a successful cyber security program. You also explained how the people depend on the guidance and leadership the CISO (Chief Information Security Officer) by stating “the organization of this objective must start with finding a motivated Chief Information Security Officer (CISO) with the experience and knowledge to lead the company’s cyber security efforts”. I also liked how you mentioned that the CISO needs to take the company's budget into consideration when implementing cyber security initiatives. I felt that you could have elaborated more on the importance of processes and technologies. You could have given some examples of processes and technologies that are currently being used in cyber security. Going into more detail about the...