When application-level security controlled by business process owners is found to be poorly managed, which of the following could BEST improve current practices?
Which of the following would be MOST helpful when justifying the funding required for a compensating control?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Which of the following approaches is BEST for selecting controls to minimize information security risks?
Which of the following is the PRIMARY benefit of implementing a maturity model for information security management?