An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
The patching and monitoring of systems on a consistent schedule is required by?
Which of the following most commonly falls within the scope of an information security governance steering committee?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
Which of the following are primary concerns for management with regard to assessing internal control objectives?
Which of the following is a benefit of a risk-based approach to audit planning?
If your organization operates under a model of "assumption of breach", you should: