In the part 1 of ‘Insecurities of a Cyber Security Leader’, I explored four origins of insecurity. This article will examine how...