Remove Business Objectives Remove CIO Remove Development Remove Risk Management
article thumbnail

Leadership in Cybersecurity

N2Growth Blog

Identity & Access Management (IAM). Vulnerability Management (VM). Business Continuity (BC). Policy & controls development with implementation. Managing enterprise risk tolerance. Security leaders are primarily reporting to the CIO. Data storage. Communicating to executives and board members.

IAM 194