Which of the following actions would senior management need to consider as part of new IT guidelines regarding the organization's cybersecurity policies?
A.
Assigning new roles and responsibilities for senior IT management.
B.
Growing use of bring your own devices for organizational matters.
C.
Expansion of operations into new markets with limited IT access.
D.
Hiring new personnel within the IT department for security purposes.
When updating cybersecurity policies, senior management must focus on emerging risks and challenges that impact the organization’s security posture. One major concern is the increasing use of Bring Your Own Device (BYOD) policies, where employees use personal devices for work-related tasks. This introduces security vulnerabilities such as unauthorized access, data leakage, and malware infections.
(A) Incorrect – Assigning new roles and responsibilities for senior IT management.
While defining roles is important, it is a management function rather than a direct cybersecurity policy update.
Cybersecurity policies focus on risks like data protection, access controls, and device security rather than IT management roles.
(B) Correct – Growing use of bring your own devices for organizational matters.
BYOD introduces security risks such as unauthorized access, weak endpoint security, and data loss.
Cybersecurity policies must address encryption, remote access controls, and mobile device management (MDM) solutions.
(C) Incorrect – Expansion of operations into new markets with limited IT access.
While IT expansion poses challenges, cybersecurity policies focus more on data security, threat management, and risk mitigation rather than market access issues.
(D) Incorrect – Hiring new personnel within the IT department for security purposes.
Hiring staff improves security operations but is a resource management decision, not a direct cybersecurity policy concern.
Cybersecurity policies focus on access controls, risk assessments, and compliance requirements.
Highlights BYOD as a key cybersecurity risk requiring clear policies and controls.
NIST Cybersecurity Framework – Mobile Device Security
Recommends specific policies for managing BYOD risks.
Analysis of Answer Choices:IIA References and Internal Auditing Standards:
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit