26:00
Stop
CISM - Information Security Program Development - Information Security Program Resources
Intermediate
1/26
Which of the following strategies is most effective for managing information security program resources during periods of budget constraints?
Intermediate