Information security governance is PRIMARILY driven by:
A. technology constraints.
B. regulatory requirements.
C. litigation potential.
D. business strategy.
A. technology constraints.
B. regulatory requirements.
C. litigation potential.
D. business strategy.