A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?
A. Risk analysis results
B. Audit report findings
C. Penetration test results
D. Amount of IT budget available
A. Risk analysis results
B. Audit report findings
C. Penetration test results
D. Amount of IT budget available