Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following should be the PRIMARY objective of an information security governance framework?
To ensure that a new application complies with information security policy, the BEST approach is to: