ThorTeaches.com is implementing a new Bring Your isaca video
cism video for thorTeaches.com is implementing a new Bring Your Own Device (BYOD) policy to allow employees to access corporate resources from their personal
            Question 1
            Be Honest
          
          
        Answer
          Full Certification Question
ThorTeaches.com is implementing a new Bring Your Own Device (BYOD) policy to allow employees to access corporate resources from their personal devices. During a risk assessment, concerns are raised about data leakage and device security. What should the information security manager prioritize to address these risks?