Register
26:00
Stop
CISM - Information Security Program Development - Information Security Program Resources
Intermediate
1/26
Which of the following strategies is most effective for managing information security program resources during periods of budget constraints?
a.
Outsourcing all security operations to third-party managed service providers
b.
Investing in cutting-edge security technologies for all organizational systems
c.
Increasing the hiring of cybersecurity professionals across all departments
d.
Implementing risk-based prioritization of security initiatives
Intermediate