An organization plans to allow employees to use their own devices on the organization’s network. Which of the following is the information security manager’s BEST course of action?
A. Implement automated software
B. Assess associated risk
C. Conduct awareness training
D. Update the security policy
A. Implement automated software
B. Assess associated risk
C. Conduct awareness training
D. Update the security policy