Which of the following processes is the FIRST step in establishing an information security policy?
A . Review of current global standards
B . Business risk assessment
C . Security controls evaluation
D . Information security audit
Answer: B
Latest CISM Dumps Valid Version with 1327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund