This presentation outlines a comprehensive strategy for securing a manufacturing company's computer and network infrastructure. It begins with an introduction emphasizing the need for robust security to win a contract and develops an IT security policy. The presentation covers physical security, including risk assessments and access control. It then delves into network security, detailing assets, risks, security plans, and technical implementations. Access control mechanisms, including authentication and data classification, are also discussed. Host security, focusing on software, firewall protection, and malware scanning, is presented. Data security measures, such as data management, cryptography, and backup/restore strategies, are also covered. The presentation addresses application security, discussing perimeter protection, self-protection, and threat detection. Finally, it outlines policies, procedures, and ongoing assessment strategies, including employee engagement and incident response, to ensure a secure IT environment. References to relevant research papers are provided to support the security measures.