Security Infrastructure Investment
Getting the management commitment
-  Risk analysis
 -  Demonstrate threat (e.g. network sniffing)
probes. 
 -  Run scanning tools against your network (be careful)
 -  Impact on company image
 -  Impact of DOS attack
 -  Information on other attacks