Based on the Drumheller (2010) article, do you consider conducting an information security gap analysis on a regular basis an essential best practice for ensuring enterprise risk management? What are the major factors to consider when conducting an information security gap analysis?
Drumheller, R. (2010). Conducting an information security gap analysis. Faulkner Information Services.,
0 comments:
Post a Comment