AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: After an audit, a vulnerability has been isaca video

Question 1
« Back   Next cism Question »

Full Certification Question

After an audit, a vulnerability has been detected in an old system, and existing controls are now ineffective. As the Information Security Manager, what is the most structured method to determine the required security enhancements?