What could go wrong? As an information security manager, I have often been asked that question. But, there are two ways it is asked.
The first is my preferred way. It is a genuine effort to identify and evaluate the risk associated with the item at hand. That is a conversation I want to have. That is a thought process I want to encourage. Continue reading