An organization is planning to open a new office in another country. Sensitive data will be routinely sent between the two offices. What should be the information security manager's FIRST course of action?
The first course of action is to identify applicable regulatory requirements (D). CISM governance requires understanding legal and regulatory obligations before defining policies, controls, or technical measures. Encryption (B), training (A), and policy updates (C) must be based on regulatory requirements to ensure compliance and avoid legal exposure. Jurisdictional risk assessment is foundational when operating across borders.
Christene
1 day agoDalene
6 days agoCasey
11 days agoCecily
17 days agoSharika
22 days agoBo
27 days agoFrance
2 months agoToi
2 months agoIn
2 months agoSharika
2 months agoWynell
2 months agoEarleen
3 months agoMeghann
3 months ago