What is BYOD? What is MDM? What are good policies for organizations to implement these?
What is BYOD? What is MDM? What are good policies for organizations to implement these?
What is BYOD? What is MDM? What are good policies for organizations to implement these?
How should users and processes be defined in a trust model? Provide example of building blocks within this trust model.
How do you optimize value in an enterprise, and what is the architect’s role in this endeavor?
How do you optimize value in an enterprise, and what is the architect’s role in this endeavor?
What are some best practices for avoiding data loss and data corruption? What questions should you ask about data to help guide these practices?
What are the different roles and responsibilities in a security incident response?
Describe the process of building a road map for enterprise security. Include the stages and activities that should take place to define it.
Compare and contrast three different types of cognitive biases in risk management.
Provide three common risk mitigation strategies for handling the enterprise.
What is the true cost of information security? How should an architect measure this cost?