ISACA Engage is getting an upgrade! Be on the lookout for more information about an exciting new Engage experience coming soon.
D. Mobile devices can be easily lost or stolen. From an enterprise risk and information security perspective, the primary concern is loss of control over sensitive information. If a device is lost or stolen , it can directly lead to d ata leakage, ...
Hi Don, I would suggest A. Probability and consequence since risk quantification uses likelihood. B. Threat and impact doesn't consider the likelihood. C. Same with Threat and exposure. D. Sensitivity and exposure are related but not primary ...
@Alfonso de Jesús Alfonso Pineda , If user awareness is the target here, then while training is important, the annual one and done training is not enough. Weekly awareness campaigns are too much, and phishing exercises in my opinion are not enough. ...