Discussion


What would be your approach to introduce potential information systems security (ISS) risks to management? Also, how could you enforce the security controls if policies were created based on your recommendations? 

Course Textbook(s) Johnson, R., & Easttom, C. (2022). Security policies and implementation issues (3rd ed.). Jones & Bartlett Learning. https://online.vitalsource.com/#/books/9781284200034