This map can be used in the planning of an Information Security Management System (ISMS) helping you identify where controls are required to manage information security risks.
Categories

ISMS Controls
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn