Credit: eweek.com

Assume that the SSG has already been created and write an executive summary on its behalf that explains how WBYT (Wild Blue Yonder Technologies) implemented six of the 12 activities. 
Your report should describe how the implementation of each activity contributes to the maturity of the security program at WBYT

The activities are below.


1. Identify software bugs found in operations monitoring and feed them back to development.

2. Use external penetration testers to find problems.

3. Ensure host and network security basics are in place.

4. Perform security feature review.

5. Ensure QA supports edge/boundary value condition testing.

6. Identify gate locations and gather necessary artifacts.

7. Build and publish security features.

8. Identify PII obligations.

9. Provide awareness training.

10. Create a security portal.

11. Have SSG perform ad hoc review.

12. Create a data classification scheme and inventory