Читать книгу Corporate Cybersecurity - John Jackson - Страница 51
2.8.2 What Criteria Are/Will Be Set Out for the Escalation of Issues?
ОглавлениеIdentifying enterprise regulations for the escalation of any identified vulnerabilities is a requirement. For example, the legal department will advise in the event that PII is accessed by a security researcher or an unauthorized threat actor.