Ishan Girdhar

4%
Flag icon
Most organizations today have an incoherent mish-mash of information security policies born out of reaction to incidents as they occur. There is seldom any mapping back to an actual strategy.
Essential CISM: Updated for the 15th Edition CISM Review Manual
Rate this book
Clear rating
Open Preview