Which of the following should be PRIMARILY included in a security training program for business process owners?
A. Application vulnerabilities
B. List of security incidents reported
C. Application recovery time
D. Impact of security risks
A. Application vulnerabilities
B. List of security incidents reported
C. Application recovery time
D. Impact of security risks