Discussion
• What is Information Security Governance?
• Common roles involved in Security Governance.
• Security Governance Documentation
• Policies utilized within the Governance process
• Measures / methods to ensure governance compliance
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.