Discussion Post: Building an Information Security Risk Management
Review the workflow steps for the security risk review in Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. What is the overall objective of the questionnaire that is distributed to primary contacts? How important is ethics when answering the various questions in the questionnaire? Provide an example of an unethical response and its impact to a company's security posture.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.