This report highlights the different techniques that can be implemented in order to develop a proper security program for Yahoo Inc. The different roles and titles for the security personnel that exist within the organization as of now will be discussed in details and furthermore, recommendations and suggestions will be provided as to how the security strategies can be improved.