List of Figures
Figure 2.1 Circular problem of information security principles.
Figure 3.1 Stakeholder analysis: attitudes of stakeholders toward IRM function.
Figure 3.2 Stakeholder analysis: capability of stakeholders in influencing IRM program.
Figure 3.4 Common risk analysis and management approach.
Get Responsive Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.