Information Security Management for Data Professionals (according to ISO 27000)
What does information security management encompass? How can it be anchored, controlled and monitored in operational data governance? Which legal requirements and standards support the implementation?