5. Question? Despite the effort spent in different elements of the information risk management system, there are still a significant number of data breach, especially internally WHY?
6.
7.
8. Information Risk vs Information Risk Management Beyond Information Technology and Cyber Risks: Systems & People COMPLIANCE PROTECTION TECHNOLOGY MANAGEMENT SYSTEM CULTURE PRACTICES & PROCEDURES EFFICIENCY GROWTH INFORAMTION LEAKAGE INTELLECTUAL PROPERTY THEFT UNAUTHORIZED ACCESS IDENTITY THEFT