Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?
Effective information security policies should be PRIMARILY developed based on:
An information security manager reviewed the access control lists and observed that privileged access was granted to an entire department. Which of the following should the information security manager do FIRST?
When conducting a post-incident review, the GREATEST benefit of collecting mean time to resolution (MTTR) data is the ability to:
Which of the following is the BEST method for management to obtain assurance of compliance with its security policy?