Describe policies and procedures used for continuous security monitoring. Describe training and continuing education policies implementation.
You will assume the role as the CTO to review the attached security report to develop proposed security improvements. You must determine the appropriate actions based on industry standards and best practices to create a plan to resolve security issues.
Ensure that your paper includes information on the following:
Describe assessment techniques used to determine threats and vulnerabilities.
Describe physical security threats and vulnerabilities.
Describe logical (technical) security threats and vulnerabilities.
Summarize required policies to protect information systems:
Acceptable Use Policy (AUP)
Mobiles device Management (MDM)
Personally identifiable information (PII)
Payment Card Industry Data Security Standard (PCI DSS)
Information system secure backup strategies
Describe policies and procedures used for continuous security monitoring.
Describe training and continuing education policies implementation.
Describe a continuity of operations plan to keep the key system operational during a disaster.