When information security management is receiving an increased number of false positive incident reports, which of the following is MOST important to review?
A. Post-incident analysis results
B. The risk management process
C. The security awareness programs
D. Firewall logs
A. Post-incident analysis results
B. The risk management process
C. The security awareness programs
D. Firewall logs