An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
Which of the following are primary concerns for management with regard to assessing internal control objectives?