An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
The effectiveness of an information security governance framework will BEST be enhanced if:
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following is MOST critical when creating an incident response plan?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following is a desired outcome of information security governance?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?