In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.
This has freed up 25 TB per logging server.
What must be updated once the truncation is verified?
A security engineer is responsible for monitoring company software, firmware, system OS, and applications for known vulnerabilities. How should they stay current on exploits and information security?
A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of
monitoring security related information.
Which ISCM feature is recommended?
A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user
profiles. The company had planned for such a breach and determined the loss would be around $2 million.
Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.
Which area of risk did the business forget to account for?