Implementing appropriate controlsis the most critical leadership responsibility when deploying mobile technologies. Controls cover access, encryption, monitoring, and loss prevention—addressing core risks such as data leakage and unauthorized access.
Acceptable use and policy alignment are necessary, butcontrols ensure security and compliance in practice.
[Reference:, CGEIT Review Manual: Domain 4 – Risk Optimization, COBIT 2019: DSS05 (Manage Security Services), APO13 (Manage Security)., , , , , , ]
Submit