Читать книгу Corporate Cybersecurity - John Jackson - Страница 51

2.8.2 What Criteria Are/Will Be Set Out for the Escalation of Issues?

Оглавление

Identifying enterprise regulations for the escalation of any identified vulnerabilities is a requirement. For example, the legal department will advise in the event that PII is accessed by a security researcher or an unauthorized threat actor.

Corporate Cybersecurity

Подняться наверх