IT Security/Objectives/Security Program Management and Oversight
Appearance
5.1 Summarize elements of effective security governance.
[edit | edit source]
|
|
5.2 Explain elements of the risk management process
[edit | edit source]
|
|
5.3 Explain the processes associated with third-party risk assessment and management.
[edit | edit source]
|
|
5.4 Summarize elements of effective security compliance.
[edit | edit source]
|
|
5.5 Explain types and purposes of audits and assessments.
[edit | edit source]
|
|
5.6 Given a scenario, implement security awareness practices.
[edit | edit source]
|
|