You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Christine Perey edited this page May 27, 2019
·
1 revision
A series of documented processes that are used to define policies and procedures around the implementation and ongoing management of information security controls in an enterprise environment. (source: Wikipedia)