Which of the following is generally considered a fundamental component of an information security program?
What should be an information security manager's FIRST course of action upon learning of a security threat that has occurred in the industry for the first time?
Which of the following is MOST important for an information security manager to ensure when evaluating change requests?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Which of the following MOST commonly falls within the scope of an information security governance steering committee?