Senior management has endorsed a comprehensive information security policy. Which of the following should the organization do NEXT?
A. Promote awareness of the policy among employees.
B. Seek policy buy-in from business stakeholders.
C. Implement an authentication and authorization system.
D. Identify relevant information security frameworks for adoption.
A. Promote awareness of the policy among employees.
B. Seek policy buy-in from business stakeholders.
C. Implement an authentication and authorization system.
D. Identify relevant information security frameworks for adoption.