- This topic has 3 replies, 5 voices, and was last updated 1 year, 5 months ago by .
- You must be logged in to reply to this topic.
Mile2 Cybersecurity Certifications
Home » Topics » OCU C)ISSO B Forum » OCU C)ISSO B Weekly Discussions » OCU C)ISSO B Discussion Lesson 02
Explain how information security management plays a key role in the success of a company. Be sure to discuss at least 3 of the following: challenges, key factors, goals, expectations, components, controls, the ownership chain, policy, maintenance, human resources, and the Triad. Use at least 3 terms from this chapter making sure to present the definition as well. Use the text and video in this discussion response.
Please email me if you need any help with these discussions.
Information security management is key to a successful company for several reasons. for example: Expectations, customers have expectations on what a company delivers (Like in the case of a bank they expect to have their money safe and have access to it when and where they need it) If a system were to go down or be compromised, the company would fail to meet that expectation. Another example could be the company’s internal Human resources, HR needs access to employee information and they need to be able to document Information that should not be made available to others if a system were to be attacked that information could get out. It is important for companies to make and keep to policies that encourage or require good IT practices like strong passwords and need-to-know policies.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.



