When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-facto implementation project?