Utilizing external resources for highly technical information security tasks allows an information security manager to:
A. transfer business risk.
B. distribute technology risk.
C. outsource responsibility.
D. leverage limited resources.
A. transfer business risk.
B. distribute technology risk.
C. outsource responsibility.
D. leverage limited resources.