When developing an information security program, a CISM should FIRST:
-
A
Procure security tools and technologies
-
B
Define the security program's scope and objectives based on business needs
-
C
Hire additional security analysts
-
D
Conduct employee phishing simulations