Activity
Constant monitoring of security management
IT Security Management
Description
Description
On the basis of documented security breakdowns and monitoring of systematic all the "weak points" are controlled. Thanks to the process the necessary measures of improvement are taken.
Organisation
Responsible role
Input/Output