Adding Value With Risk-Based Information Security

A shield hovering above a hand
Author: Luigi Sbriz, CISM, CRISC, CDPSE, ISO/IEC 27001:2022 LA, ITIL V4, NIST CSF, UNI 11697:2017 DPO
Date Published: 1 September 2024
Read Time: 18 minutes
Related: Cybersecurity Audit Program: Based on the NIST Cybersecurity Framework 2.0 | Digital | English

Effective IT security management system design must start with top management and include the entire perimeter of the supply chain, with special attention paid to ensuring compliance with all relevant laws. Adherence to international....

 

Members, login to keep reading.

Not a member but want to read more?
Explore ISACA member benefits today.