Risk Management Guide for Information Technology …

• The IT security program manager, who implements the security program • Information system security officers (ISSO), who are responsible for IT security • IT system owners of system software and/or hardware used to support IT functions. • Information owners of data stored, processed, and transmitted by the IT systems ................
................