When managing the security architecture for your company you must consider:
From an information security perspective, information that no longer supports the main purpose of the business should be:
What two methods are used to assess risk impact?
The Information Security Governance program MUST: