cism video for when developing metrics to assess the capacity of a vulnerability management program, what should an information security manager consider first?
When developing metrics to assess the capacity of a vulnerability management program, what should an information security manager consider first?