Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?