article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Policy & controls development with implementation. Security leaders are primarily reporting to the CIO. Actively listens while proactively accepting critique from subordinates, executives and board members. Identity & Access Management (IAM). Vulnerability Management (VM). Data storage. Business Continuity (BC).

IAM 194