CISM Certified Information Security Manager – Question1268

Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?

A.
Make backups of the affected systems prior to transfer.
B. Increase cyber insurance coverage.
C. Identify all information assets in the legacy environment.
D. Assign owners to be responsible for the transfer of each asset.

Correct Answer: C