A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?
Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?