Who is generally involved in a vulnerability assessment?If you were the CISO, what would you like to see in the vulnerability assessment report?
Submit one initial post addressing the topics below, and respond to two classmate’s posts.
1. What is vulnerability assessment?
2. Who is generally involved in a vulnerability assessment?
3.If you were the CISO, what would you like to see in the vulnerability assessment report?
Guidelines:
Provide one post of no less than 300 words. Cite sources when applicable.
Sources and citations should be in APA format.