An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Which of the following is MOST difficult to measure following an information security breach?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following activities is designed to handle a control failure that leads to a breach?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
As part of incident response activities, the BEST time to begin the recovery process is after:
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following is the MOST important consideration when attempting to create a security-focused culture?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following is the MOST effective way to help assure the integrity of an organization’s accounting system?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
Which of the following would BEST enable a new information security manager to assess the current state of information security governance within the organization?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following is the BEST method for determining whether new risks exist in legacy systems?
Which of the following is the MOST important outcome of a post-incident review?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following is MOST critical when creating an incident response plan?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
During an information security audit, it was determined that IT staff did not follow the established standard when configuring and managing IT systems. Which of the following is the BEST way to prevent future occurrences?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following has the MOST influence on the inherent risk of an information asset?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Which of the following is the PRIMARY objective of a business impact analysis (BIA)?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
An information security manager is updating the organization's incident response plan. Which of the following is the BEST way to validate that the process and procedures provided by IT and business units are complete, accurate, and known by all responsible teams?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
The BEST way to report to the board on the effectiveness of the information security program is to present:
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following MUST be established to maintain an effective information security governance framework?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following backup methods requires the MOST time to restore data for an application?
An organization is planning to engage a third-party service provider to develop custom software. Which of the following would help to provide the GREATEST assurance of software security?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following BEST enables the integration of information security governance into corporate governance?
When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
Which of the following is the MOST critical activity for an information security manager to perform periodically throughout the term of a contract with an outsourced third party?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following is the FIRST step to establishing an effective information security program?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following BEST informs the design of an information security framework?
Which of the following is the MOST effective way to increase security awareness in an organization?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
The PRIMARY objective of a post-incident review of an information security incident is to:
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following provides the MOST effective response against ransomware attacks?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
The PRIMARY reason for creating a business case when proposing an information security project is to:
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Implementing the principle of least privilege PRIMARILY requires the identification of:
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
What should be an information security manager's MOST important consideration when developing a multi-year plan?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following is MOST important when responding to a major security incident?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following is MOST important to include in an information security policy?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
The PRIMARY purpose of implementing information security governance metrics is to:
Which of the following should be the PRIMARY objective of an information security governance framework?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
What is the BEST way to inform senior management of the value of information security?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
Network isolation techniques are immediately implemented after a security breach to:
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following presents the GREATEST challenge when assessing the impact of emerging risk?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is MOST important to include in an information security strategy?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the MOST effective way to ensure information security policies are understood?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following would BEST justify spending for a compensating control?
Which risk is introduced when using only sanitized data for the testing of applications?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following is MOST important when designing security controls for new cloud-based services?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is the MOST important factor of a successful information security program?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is the MOST important objective of post-incident review activities?
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following BEST helps to ensure risk appetite is considered during the risk treatment process?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following is the GREATEST benefit of information asset classification?
What is the information security steering committee’s PRIMARY role in the development of security policies?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following would BEST enable the timely execution of an incident response plan?
Who is accountable for approving an information security governance framework?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Which of the following is the BEST indicator of an organization's information security status?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following BEST enables users to recover from ransomware or malware attacks?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Which of the following should be the PRIMARY basis for an information security strategy?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Who is BEST positioned to take ownership of critical IT security risks identified in an application?
Which of the following is the PRIMARY objective of information asset classification?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
To help ensure that an information security training program is MOST effective, its contents should be:
What is the PRIMARY objective of implementing standard security configurations?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following is the MOST important factor in successfully implementing Zero Trust?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
Which of the following is MOST important to include in monthly information security reports to the board?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
When developing a categorization method for security incidents, the categories MUST:
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the PRIMARY benefit of an information security awareness training program?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following tools would be MOST helpful to an incident response team?
Which of the following provides the BEST indication of the return on information security investment?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Which of the following is the GREATEST threat posed by quantum computing technology for information security?
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which of the following should be done FIRST once a cybersecurity attack has been confirmed?
Which of the following will BEST enable an effective information asset classification process?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following business units should own the data that populates an identity management system?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
The GREATEST benefit of an effective information security awareness program is the organization’s ability to:
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Identifying which of the following BEST enables a cyberattack to be contained?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following is the BEST reason to implement an information security architecture?
What should an information security manager verify FIRST when reviewing an information asset management program?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following is MOST important to the effectiveness of an information security program?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following is a function of the information security steering committee?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST: