Project Management Central

Please login or join to subscribe to this thread

Topics: Business Analysis/Requirements Management
Information security

What mechanisms are being implemented in projects to manage information security?

Please login or join to reply

Content ID:

"When one door closes another door opens; but we often look so long and so regretfully upon the closed door that we do not see the ones which open for us."

- Alexander Graham Bell