In a resource-restricted security program, which of the following approaches will provide the BEST use of the limited resources?
A. Cross-training
B. Risk avoidance
C. Risk prioritization
D. Threat management
A. Cross-training
B. Risk avoidance
C. Risk prioritization
D. Threat management