Discussion Post
The Executive Board approved your Security Program Charter.
a) Draft the CISO's threat and vulnerability control plan.
b) To set the stage for the document and provide the reader an understanding of its purpose, begin with an introduction that describes a recent major computer security incident.
c) Explain the various control strategies such as detection and prevention and explain how each will be used.
d) Provide insight into some of the methods and tools that will be used to address threats and reduce vulnerabilities to PCS information system assets.
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.