Business Line : Features / Mentor : Auditing cyber security infrastructure | ICT Security-Sécurité PC et Internet | Scoop.it

Cyber security policy should be based on business requirements and overall risk assessment, in order to be effective and the auditor plays an important role.

October 9, 2011:

In the emerging scenario of digital espionage and cyber warfare, protecting critical cyber infrastructure is increasingly becoming a formidable challenge.

Entities in key sectors such as banking and finance, energy, oil, power, defence, chemical, transportation, telecommunications, use a combination of information technologies.