An information security team has been tasked with identifying confidential data within the organization to formalize its asset classification scheme. The MOST relevant input would be provided by:
During which phase of development is it MOST appropriate to begin assessing the risk of a new application system?
The ability to integrate information security governance into corporate governance is PRIMARILY driven by:
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
A new system has been developed that does not comply with password-aging rules. This noncompliance can BEST be identified through: