ISACA, 2013 Transforming Cybersecurity using COBIT5
ISACA, 2013 Transforming Cybersecurity using COBIT5
Impact of an attack on the business
Managing cybercrime risks appropriately
ISACA, 2013 Transforming Cybersecurity using COBIT5
www.isaca.org/cobit
People are the weakest link. You can have the best technology, firewalls, intrusion-detection systems, biometric devices - and somebody can call an unsuspecting employee. That's all she wrote, baby. They got everything.