A threat intelligence report indicates there has been a significant rise in the number of attacks targeting the industry. What should the information security manager do NEXT?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
Which of the following should be included in an annual information security budget that is submitted for management approval?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following is the BEST indication of information security strategy alignment with the business?