1. Suggest a review process that ensures business and security issues are both considered in a systems design or purchase decision making.
2. How can business process owners be motivated to accept their responsibilities of data ownership in the sensitivity and criticality review process?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here