Q: 13
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one
that is most sufficient and least costly. The implementation project planning is completed and the
teams are ready to implement the solution. The CISO then discovers that the product it is not as
scalable as originally thought and will not fit the organization’s needs.
What is the MOST logical course of action the CISO should take?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.