How to define the security program, adopt best practices, assign roles and responsibilities. How to determine what needs to be protected, identify threats to security and privacy of information assets, manage remediation of weaknesses. How to offer new employee training, ongoing user awareness, security staff education/certification. How to create an effective incident response plan, law enforcement notification, customer breach notification, forensics and preservation of evidence.
|
ISSC Security >