Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Comprehensive and Detailed Step-by-Step Explanation:
Justifying investments in information security requires aligning proposals with business objectives to gain management approval.
A . Vulnerability scan results: These provide technical insights but are insufficient for high-level justification.
B . Competitor benchmark analysis: While useful, this is less relevant than demonstrating direct alignment with organizational needs.
C . Previous security budget: Historical data may provide context but does not justify future needs.
D . Business requirements: This is the BEST answer because aligning security investments with business objectives demonstrates the value and necessity of the program to stakeholders.
Tonette
2 months agoHoward
1 months agoLajuana
2 months agoBeth
2 months agoPeggie
2 months agoHoward
2 months agoKandis
2 months agoVicky
2 months agoPeggie
2 months agoVanna
2 months agoLeanora
1 months agoJani
2 months agoYan
2 months agoKattie
2 months agoSalena
2 months agoHoward
3 months ago