Guy’s company recently experienced a significant data breach involving the personal data of many of their customers. Which breach laws should they review to ensure that they are taking appropriate action?
After completing the first year of his security awareness program, Frank reviews the data about how many staff completed training compared to how many were assigned the training to determine whether he hit the 95 percent completion rate he was aiming for. What is this type of measure called?
In her role as a developer for an online bank, Karen is required to submit her code for test ing and review. After it passes through this process and it is approved, another employee moves the code to the production environment. What security management does this process describe?