1. Explain why it is becoming more important for organizations to make cyber risk management
a high priority?
2. Name four U.S. government regulations that relate to cyber risk management.
3. What is the purpose of rogue application monitoring?
4. Why is a mobile kill switch or remote wipe capability an important part of managing cyber risk?
5. Why does an organization need to have a business continuity plan?
6. Name the three essential cybersecurity defenses.
7. Name three IT defenses.
8. Why do companies impose do-not-carry rules?