After obtaining commitment from senior management, which of the following should be completed NEXT when establishing an information security program?
A. Define security metrics
B. Conduct a risk assessment
C. Perform a gap analysis
D. Procure security tools
A. Define security metrics
B. Conduct a risk assessment
C. Perform a gap analysis
D. Procure security tools