Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
Which technology can provide a computing environment without requiring a dedicated hardware backend?
When creating contractual agreements and procurement processes why should security requirements be included?