subject

The chief information officer (cio) has been asked to develop a security dashboard with the relevant metrics. the board of directors will use the dashboard to monitor and track the overall security posture of the organization the cio produces a basic report containing both kpi and kri data in two separate sections for the board to review. which of the following best meets the needs of the board? a) kri: compliance with regulations . backlog of unresolved security investigations . severity of threats and vulnerabilities reported by sensors time to patch critical issues on a monthly basis api time to resolve open security items . % of suppliers with approved security control frameworks edr coverage across the fleet threat landscape rating b) kri: edr coverage across the fleet backlog of unresolved security investigations time to patch critical issues on a monthly basis threat landscape rating kpi time to resolve open security items compliance with regulations . % of suppliers with approved security control frameworks severity of threats and vulnerabilities reported by sensors

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 20:20, jazzy4211
Sometimes writers elaborate on the truth when recalling past events so they can enhance their narrative essay with more interesting descriptions. do you feel that published writers should or should not embellish real life events just to make their stories more interesting?
Answers: 2
image
Computers and Technology, 22.06.2019 03:30, juliannxkim
Which group on the home tab allows you to add shapes to a powerpoint slide?
Answers: 1
image
Computers and Technology, 22.06.2019 19:00, alyssashae1818
Which parts of a presentation should be the most general? a. introduction and conclusion b. introduction and outline c. outline and conclusion d. outline and body
Answers: 1
image
Computers and Technology, 23.06.2019 01:00, Ltik11900
Write the command that can be used to answer the following questions. (hint: try each out on the system to check your results.) a. find all files on the system that have the word test" as part of their filename. b. search the path variable for the pathname to the awk command. c. find all files in the /usr directory and subdirectories that are larger than 50 kilobytes in size. d. find all files in the /usr directory and subdirectories that are less than 70 kilobytes in size. e. find all files in the / directory and subdirectories that are symbolic links. f. find all files in the /var directory and subdirectories that were accessed less than 60 minutes ago. g. find all files in the /var directory and subdirectories that were accessed less than six days ago. h. find all files in the /home directory and subdirectories that are empty. i. find all files in the /etc directory and subdirectories that are owned by the group bin."
Answers: 1
You know the right answer?
The chief information officer (cio) has been asked to develop a security dashboard with the relevant...

Questions in other subjects:

Konu
Mathematics, 08.01.2020 18:31
Konu
Mathematics, 08.01.2020 18:31