IT Security/Objectives/Security Program Management and Oversight
5.1 Summarize elements of effective security governance.
edit
|
|
5.2 Explain elements of the risk management process
edit
|
|
5.3 Explain the processes associated with third-party risk assessment and management.
edit
|
|
5.4 Summarize elements of effective security compliance.
edit
|
|
5.5 Explain types and purposes of audits and assessments.
edit
|
|
5.6 Given a scenario, implement security awareness practices.
edit
|
|