While auditing a data center's IT architecture, an information security manager discovers that required encryption for data communications has not been implemented. Which of the following should be done NEXT?
The MOST basic requirement for an information security governance program is to:
When residual risk is minimized:
Successful implementation of information security governance will FIRST require: