A core business unit relies on an effective legacy system that does not meet the current security standards and threatens the enterprise network. Which of the following is the BEST course of action to address the situation?
When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify:
During which stage of the software development life cycle (SDLC) should application security controls FIRST be addressed?
Which of the following is MOST important when developing an information security strategy?