An organization has received notification that it is a potential victim of a cybercrime that may have compromised sensitive customer data. What should be The FIRST course of action?
During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?
Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
Which of the following is the GREATEST benefit of centralizing IT systems?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by: