Review
NIST guidance for required / recommended security controls (see NIST SP 800-12,
NIST SP 800-53, and NIST SP 800-100).
Find and review additional authoritative /
credible sources on your own which provide information about IT security issues
(related to data breaches / responses, shadow IT, and/or social media use) which
require policy solutions.
Min. of 4 Authoritve/ Credible Sources
Additionaly information provided upon taking the job.
Leave a Reply
You must be logged in to post a comment.