| 21. | Successful application of enterprise information security architecture requires appropriate positioning in the organization.
|
| 22. | He established an information security company and published a magazine " Security ".
|
| 23. | Information encryption is one of effective means to achieve cloud computing information security.
|
| 24. | Rubin is technical director of the Information Security Institute at Johns Hopkins University.
|
| 25. | ISSA has established an Information Security Program alliance with Microsoft Corporation.
|
| 26. | ISO 27001 is regarded as the benchmark for information security management.
|
| 27. | Overlying these processes are human capital management and information security management.
|
| 28. | Giuseppe Cucchi was director general of the Department of information security.
|
| 29. | The chief information security officer ( CISO ) focuses on information security management.
|
| 30. | The implementation includes information security as an autonomous function inside wider corporate governance.
|