You are the CISO for a major hospital system and are preparing to sign a contract with a software as a service (SaaS) email vendor and want to ensure that its business continuity planning measures are reasonable. What type of audit might you request to meet this goal?
Tim enables an application firewall provided by his cloud infrastructure as a service provider that is designed to block many types of application attacks. When viewed from a risk management perspective, what metric is Tim attempting to lower?
Steven works for an e-commerce company that recently had some content stolen by another website and republished without permission. What type of intellectual property protection would best preserve Steven’s company’s rights?