Discussion: Cybersecurity Policy Design Issues
1. Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication.
2. What features can be added to a business cybersecurity policy to help protect it against effects from possible upstream, Multi-Sector, cascade failures due to poor cybersecurity policy management in upstream organizations?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.