Discussion Post
• Deeply examine the determinants of successful security policies, including but not limited to the legal and regulatory environments in which these policies are developed. Categorize the various security issues an organization might face and prioritize some of the potential security issues.
• Contrast post implementation activities with those leading up to policy implementation. Explain how post-implementation activities are or are not as important as those leading to policy implementation?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.