Who ultimately has ultimate responsibility for the computer security policies and organization implements and why? Consider the data owner, system owner, executive management, CIO, CEO, and the company’s Board members?
Which of the social engineering scams do you find the most interesting? Have any you ever been the victim of a social engineering scam?