Home

Join The Conversation

  • Posted in: CISM Exam prep

    D. Mobile devices can be easily lost or stolen. From an enterprise risk and information security perspective, the primary concern is loss of control over sensitive information. If a device is lost or stolen , it can directly lead to d ata leakage, ...

  • Posted in: CRISC Exam prep

    Hi Don, I would suggest A. Probability and consequence since risk quantification uses likelihood. B. Threat and impact doesn't consider the likelihood. C. Same with Threat and exposure. D. Sensitivity and exposure are related but not primary ...

  • @Alfonso de Jesús Alfonso Pineda , If user awareness is the target here, then while training is important, the annual one and done training is not enough. Weekly awareness campaigns are too much, and phishing exercises in my opinion are not enough. ...

 Share Your Thoughts

Log in above to see the latest Engage poll and share your thoughts!

Participate iconApply to Volunteer

  • Monday, January 19, 2026 - Friday, December 18, 2026
    Online Opportunity
    Working Group (Ongoing annual/seminannual opportunities)

Advancing Members iconMost Active Members